Quiz I Review Firewalls and Networking

Ace your homework & exams now with Quizwiz!

List the typical minimum set of mechanisms for assuring the security of a DMZ:

A dedicated port on the firewall device or a screened subnet. DMZ segment with additional authentication and authorization controls.

Describe what a firewall does?

A firewall can be either hardware or software implemented on a host computer. A firewall is a means of controlling traffic into or out of a system or network.

What is a Bastion host? Give an example of it's use.

A highly secure host system that can if exposed to hostile elements it can withstand it.

What Is Default Route Configuration Command In Asa Firewall?

A static route with 0.0.0.0/0 (IPv4) or ::/0 (IPv6) as the destination IP address.

Packet-filtering router

Ability to restrict a specific service Standard in most routers Unable to detect whether packet headers have been modified

Application Layer Gateways

Also called proxy server Works at the application layer Intermediary between two systems Control the way applications inside the network access external networks

Explain how a firewall restricts access to a network

Filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your network.

Firewall infrastructure considerations

Firewall placement is crucial, Firewalls are not substitutes for security policy, Trained administrators must understand network protocols and the security policy, Firewalls will introduce latency

*Describe how firewall rules are created and how they are used to control the behavior of the firewall.

Firewall rules are stored in the non-volatile memory, configurable and available each time devices are restarted. They are used to control communication on its installed systems by denying or allowing traffic behavior.

*List the types of firewall protection as well as the types of firewall implementations and the ways they are used: Static packet filtering

First generation devices that examine data packets at Network layer 3 , based on pre-configured rules

What does the command "nameif " do?

Gives the interface a name and assigns a security level.

What does the command "interface' do?

Identifies either the hardware interface or the switch virtual interface(VLAN interface) that will be configured.

List one Disadvantage of multi-layer filtering.

It adds latency on network transmission causing long processing time.

Packet Filtering FWR Simple and effective however they?

Lacks strong authentication Complex ACLs can degrade network performance

Proxy Server task include

Load balancing IP address mapping Filtering specific content URL filtering Fragmentation attack prevention

*List the types of firewall protection as well as the types of firewall implementations and the ways they are used: Dynamic Packet-filtering (aka stateful firewall)

Monitors the actual communication process by maintaining a state table. Packets that are part of an existing session(or state) are permitted to pass.

At which OSI layer is a logical path created between two host systems?

Network

Best firewall configuration depends on: (Choose All that Apply)

Objectives of the network Organization's ability to develop and implement architecture Available budget

List the types of firewall protection as well as the types of firewall implementations and the ways they are used: Circuit-level

Operates at the transport layer 4, Doesn't usually examine traffic, creates tunnels connecting specific processes or systems.

Screened Host Firewalls

Packet-filtering router is combined with a separate dedicated firewall. Router prescreens packets and minimizes load on internal proxy.

Show mac-address-table

Shows all MAC table entries of all types

*When configuring a Packet Filter what is one of the first things you should do?

Start with a security policy, specify allowable packets in terms of logical expressions on packet fields, Rewrite expressions in syntax supported by your vendor.

Which of the following are associated with the application layer of the OSI model? (Choose two.)

Telnet FTP

While troubleshooting a network connectivity problem, a technician observes steady link lights on both the workstation NIC and the switch port to which the workstation is connected. However, when the ping command is issued from the workstation, the output message "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?

The network layer

Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two)

The transport layer divides a data stream into segments and adds reliability and flow control information. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

Show Vlan

To display all VLANs information on the switch

Show interface

To display statistics for all interfaces configured on the router or access server.

Show running-config

To display the configuration information currently running on the terminal.

show version

To display the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images.

show ip route

To display the current state of the routing table.

Show privilege

To show the current privilege level, username, and status of cumulative privilege support

Define the Media Access Control

Transmission of data packets to and from the network interface card to and from another remotely shared channel.

Dynamic stateful filtering firewalls make changes to filtering rules based on events as they happen (True/False).

True

Need separate proxies for each service: (True/ False) i. E.g., SMTP (E-Mail)

True

Need separate proxies for each service: (True/ False) ii. NNTP (Net news)

True

Need separate proxies for each service: (True/ False) iii. DNS (Domain Name System)

True

Need separate proxies for each service: (True/ False) iv. NTP (Network Time Protocol)

True

Stateless inspection ignores state of the connection (True/False).

True

*In the Packet Tracer Lab 1... Logging Synchronous is used. What is the purpose of this?

Used to synchronize unsolicited messages and debug output with solicited CISCO IOS software output and prompts for a specific console port line, aux port line, or vty.

Dual-homed host firewalls

With this approach, the bastion host contains two NICs. One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection. With two NICs, all traffic must go through the firewall in order to move between the internal and external networks.

*List the types of firewall protection as well as the types of firewall implementations and the ways they are used:Application Layer aka (Proxy Server)

Works at the application layer 7,6,5, Intermediary between two systems, Controls the way applications inside the network access external networks.

*Can We Block Https Traffic On Firewall?

Yes, but this blocks access to sites that may not need to be blocked. Best way is to block https traffic for specific IP range,

It is known that the OSI model has seven layers. Can you tell me at which layers of the OSI model WANs operate? (Choose two.)

datalink layer physical layer

Show clock

displays the system time

What functions do routers perform in a network? (Choose two.)

path selection packet switching

Application-Level Filtering have full access to protocol> One the following in the order they occur: Enter (second)

proxy validates request as legal

Application-Level Filtering have full access to protocol> One the following in the order they occur: Enter ( third)

then actions request and returns result to user

Application-Level Filtering have full access to protocol> One the following in the order they occur: Enter (first)

user requests service from proxy

A well placed firewall can correct all security issues (True/False).

False

Explain how intrusion detection and prevention systems are related and how they may be made to interact with one another.

Both read network packets and they interact by comparing the contents to a database of known threats.

Local devices address packets to the router's MAC address in the MAC header. After receiving the packets, the router must perform the following steps: 4.

Build the new MAC header and forward the packet. Finally, the router builds a new MAC header for the packet. The MAC header includes the router's MAC address and the final destination MAC address or the MAC address of the next router in the path. Figure 5 shows the contents of a packet before and after it has been forwarded by a router. Figure 5 also shows the contents of the router's routing tables. Figure 5: Routers forward packets based on the network address.

Local devices address packets to the router's MAC address in the MAC header. After receiving the packets, the router must perform the following steps: 1.

Check the incoming packet for corruption, and remove the MAC header . The router checks the packet for MAC-layer errors. The router then strips off the MAC header and examines the network layer header to determine what to do with the packet.

*What does Deep packet inspection do?

Combines stateful packet filtering with ability to analyze protocols for inconsistencies

Multi-Layer Filtering

Deep packet inspection which combines stateful packet filtering with ability to analyze protocols for inconsistencies. However its disadvantage is longer processing time.

How do you enter User EXEC Mode

Default mode after booting. Press enter for accessing this. router>...en...Router#.....config t...Router(config)#

Local devices address packets to the router's MAC address in the MAC header. After receiving the packets, the router must perform the following steps: 3.

Determine the route to the destination. Routers maintain a routing table that lists available networks, the direction to the desired network (the outgoing interface number), and the distance to those networks. After determining which direction to forward the packet, the router must build a new header. (If you want to read the IP routing tables on a Windows 95/98 workstation, type ROUTE PRINT in the DOS box.)

*List the types of firewall protection as well as the types of firewall implementations and the ways they are used: Transparent

Easy to add to an existing network and they Filter and inspect traffic flows based on pre-configured rules and interface security levels.

Stateful packet-filtering firewalls

Examine data in the packet Examine state of the connection between internal and external computers Allows incoming packets sent in response to internal requests

Local devices address packets to the router's MAC address in the MAC header. After receiving the packets, the router must perform the following steps: 2.

Examine the age of the packet. The router must ensure that the packet has not come too far to be forwarded.


Related study sets

Sociology final terms and definitions

View Set

Organizational Behavior Final Exam

View Set

NU472 Week 6 HESI Case Study Evolve Elsevier: Intimate Partner Violence and PTSD - 29 Questions

View Set

Prejudice, Discrimination, and Stereotypes

View Set