Term
What firewalls inspect the header of each packet to locate the source and destination IP Addresses, protocol id, type of packet, routing protocols etc? |
|
Definition
Packet Filtering Firewalls |
|
|
Term
What are the following?:
•Restricts traffic allowed on network
•Used to implement security zones
•Configured with access control rules
•Different types of firewall |
|
Definition
Basic Firewall Attributes |
|
|
Term
What are the following?:
oCan examine TCP headers
oState table
o(Can also apply packet filtering rules)
o Better protects against DOS |
|
Definition
Attributes of Stateful Inspection Firewalls |
|
|
Term
What are the following?:
•“Stateful Multilayer Inspection” or “Deep Packet Inspection”
•Can examine packet payload and monitor connections (stateful)
•Requires filter for each application type |
|
Definition
Attributes of Aware Firewalls |
|
|
Term
|
Definition
|
|
Term
What are the following?:
•Rule-based management
•Firewall rules (tuples)
•Access Control List
•Flood guard
•Implicit deny
•Troubleshooting |
|
Definition
Elements of Firewall Configuration |
|
|
Term
What are the following?:
•Able to inspect code in HTTP packets
•Matches suspicious code to vulnerability database
•Can be implemented as software on host or as appliance |
|
Definition
Attributes of Web Application Firewalls |
|
|
Term
What are the following?:
oBreaks end-to-end connection between hosts
oProxy opens the connection with the server on behalf of the client (or vice versa)
oMost stateful firewalls are implemented as proxies
oMost can also cache and pre-fetch content to improve performance |
|
Definition
|
|
Term
What is a packet filtering firewall forwards or blocks only? |
|
Definition
|
|
Term
What are the following?:
oSpoof victim's IP address and attempt to open connections with multiple servers
oThose servers direct their SYN/ACK responses to the victim |
|
Definition
Attributes of Amplified SYN flood |
|
|
Term
|
Definition
|
|
Term
What is ping amplifying a network using victim IP? |
|
Definition
|
|
Term
What are the following?:
oDirect responses at victim
oQueries can be constructed to generate large response packets |
|
Definition
Capabilities of Bogus DNS / NTP queries |
|
|
Term
|
Definition
|
|
Term
What is an Amplification Attack? |
|
Definition
Distributed Reflection DoS (DRDoS) |
|
|
Term
What does a Bogus DNS Server Allow A Hacker To Do? |
|
Definition
Redirect you anywhere they want |
|
|
Term
What drops traffic to protect other hosts in the routing domain? |
|
Definition
|
|
Term
What distributes requests across farm or pool of servers (nodes)? |
|
Definition
|
|
Term
|
Definition
•Provides stateful fault tolerance
•Configure nodes for failover |
|
|
Term
|
Definition
DNS server returns IP from a group in response to name queries |
|
|