Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
A Stateful Packet-Filtering Firewall filters traffic based on? |
Stateful Packet-Filtering Firewall filters traffic based on fields in the header of the packet, such as the source and destination IP address and the source and destination port numbers and what packets there needs to be in a three-way handshake. |
|
A Packet-Filtering Firewall filters traffic based on? |
Packet-Filtering Firewall filters traffic based on fields in the header of the packet, such as the source and destination IP address and the source and destination port numbers.
|
|
An Application Firewall filters traffic based on? |
Application Firewall filters Stateful/Packet-filtering and payload data. |
|
What Home Router are multifunctional devices. What are the features it has? |
Network Address Translation (NAT), Firewall and URL-Filtering. |
|
What is the Dual-Homed Firewall Topology do? |
A single computer with two physical network interfaces that acts as a gateway between the networks. Software is used as firewalls and Internet <-> Firewall <-> Internal Network |
|
What is the Screen-Host Firewall Topology do? This is not a Firewall it is hardware. |
A Dual-Homed host with a screening router in between the host and the public network this allows packet filtering before packets reach the host.
Internet <-> Screen Router <-> Screened-Host Firewall <-> Internal Network |
|
What is the Screened-Subnet Firewall Topology do? |
Internet <-> Screen Router <-> Screened-Host Firewall <-> Screen Router <-> Internal Network |
|
What does a Private LAN firewall do? |
Ensures that no traffic from any other network is sent through the firewall. |
|
What is the DMZ? |
An area between two firewalls that allows selected traffic from the Internet to pass through the external firewall into the system withing the DMZ. |
|
What four servers are normally placed in the DMZ? |
|
|
An Intrusion Detection System (IDS) is? |
Is responsible for monitoring activity on a system or network and then logging or notifying the administrator of any suspicious activity. |
|
Name three IDS System types? |
|
|
Name two methods of implementing IDS? |
|
|
What are the components of a NIDS? |
|
|
What are the two Classes of IDSes? |
|
|
What is the promiscuous mode of a network card? |
Means the network card will receive all traffic. |
|
What are two common methods of bypassing the filtering feature on a switch? |
|
|
Name three types of network designs? |
|
|
What is Network Address Translation (NAT)? |
A device that allows private address ranges on the inside of a network to be translated to public address thereby hiding the private network, |
|
What is Network Access Control (NAC)? |
Technology that allows you to control who can access your network based on specific conditions. If the conditions are not met then the device can be send to a restricted network, which allows them to remedy their situation. |
|
SIP and RTP are generally used with VoIP and it is common security practice to use a ____________ ________ should be set to separate them? |
to use a VLAN to separate them from other network traffic. |