🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Cyber Security Chapter-3: Network Defense Tools Firewalls Basics
30 Questions
0 Views

Cyber Security Chapter-3: Network Defense Tools Firewalls Basics

Created by
@FeatureRichCarbon

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a firewall?

  • To slow down internet traffic
  • To allow unrestricted access to all network traffic
  • To secure the inside network from external threats (correct)
  • To increase network speed
  • How does a firewall control traffic flow?

  • By increasing the speed of data transmission
  • It has no control over traffic flow
  • Based on predefined rules set in the firewall (correct)
  • By randomly allowing or denying traffic
  • Which networks are typically separated by a firewall?

  • School networks from corporate networks
  • LAN from WAN
  • Two external networks
  • Internal network from the internet (correct)
  • Based on the text, what is one of the methodologies that firewalls use to filter traffic?

    <p>Filtering based on source and destination addresses</p> Signup and view all the answers

    Which statement describes the function of a firewall accurately?

    <p>Firewalls protect one side from the other side</p> Signup and view all the answers

    How does a firewall influence the flow of traffic between two networks?

    <p>By controlling traffic based on specified rules</p> Signup and view all the answers

    What is a limitation of circuit-level gateways mentioned in the text?

    <p>They do not check the packet content</p> Signup and view all the answers

    Which type of firewall combines packet inspection technology with TCP handshake verification for enhanced protection?

    <p>Stateful Inspection Firewalls</p> Signup and view all the answers

    What distinguishes Application Level Firewalls from other types of firewalls?

    <p>They operate at the application level</p> Signup and view all the answers

    Which feature is NOT commonly associated with Next-Generation Firewalls?

    <p>Packet filtering based on source IP</p> Signup and view all the answers

    Why do Stateful Inspection Firewalls put more strain on computing resources compared to circuit-level gateways?

    <p>Due to combining packet inspection and TCP handshake verification</p> Signup and view all the answers

    In what scenario would a packet with malware but correct TCP handshake pass through circuit-level gateways?

    <p>If the correct TCP handshake is present</p> Signup and view all the answers

    What is a big benefit of using cloud-based firewalls?

    <p>Scalability with organizational growth</p> Signup and view all the answers

    What is the role of a proxy in a network transaction?

    <p>Act as a middle-man</p> Signup and view all the answers

    Which statement is true about firewalls and proxies?

    <p>Firewalls involve proxies to manage network transactions.</p> Signup and view all the answers

    What distinguishes cloud firewalls from hardware firewalls?

    <p>Scalability</p> Signup and view all the answers

    Which network component does not know about the address space on the other side of the firewall?

    <p>Firewall</p> Signup and view all the answers

    What type of program is required for each protocol or network transaction in a firewall setup?

    <p>Specific proxy program</p> Signup and view all the answers

    What are the important components of a firewall rule?

    <p>Action, packet attributes, direction of the rule, and type of source</p> Signup and view all the answers

    Which type of firewall filtering does not remember information about passing packets?

    <p>Stateless packet filtering</p> Signup and view all the answers

    What is a potential drawback of stateless firewalls?

    <p>They are easily fooled by hackers</p> Signup and view all the answers

    In a firewall rule, what does 'deny proto icmp type 8:0 from any to 192.168.1.0/24' indicate?

    <p>Denying ICMP 'ping' traffic to subnet 192.168.1.0/24</p> Signup and view all the answers

    What would be the correct rule to allow incoming web traffic to 192.168.1.50?

    <p>allow proto tcp from any to 192.168.1.50:80</p> Signup and view all the answers

    Why are stateful firewalls considered smarter than stateless firewalls?

    <p>Stateful firewalls remember information about previous packets</p> Signup and view all the answers

    What is the primary function of proxy firewalls?

    <p>To filter incoming traffic between the network and the traffic source</p> Signup and view all the answers

    How do proxy firewalls differ from stateful inspection firewalls?

    <p>Proxy firewalls perform deep packet inspection, checking the actual contents</p> Signup and view all the answers

    What is the advantage of proxy firewalls in terms of network security?

    <p>They create an extra layer of separation, obscuring devices on the network</p> Signup and view all the answers

    What is a potential drawback of using proxy firewalls?

    <p>They may create significant network slowdown due to extra steps</p> Signup and view all the answers

    What is the primary purpose of circuit-level gateways?

    <p>To quickly approve or deny traffic without consuming significant resources</p> Signup and view all the answers

    What does the TCP handshake verification performed by circuit-level gateways aim to achieve?

    <p>To ensure that the session the packet is from is legitimate</p> Signup and view all the answers

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser