Firewalls, IDS/IPS and OSI Model

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

A firewall operates exclusively as a hardware device, offering robust perimeter security.

False (B)

Host-based firewalls are installed on individual systems, monitoring and controlling network traffic specifically for that machine.

True (A)

An Intrusion Detection System (IDS) actively blocks malicious traffic, preventing attacks in real-time.

False (B)

The OSI model contains seven layers that standardize how computer systems communicate over a network.

<p>True (A)</p> Signup and view all the answers

The TCP protocol is responsible for ensuring reliable, ordered, and error-checked delivery of data between applications.

<p>True (A)</p> Signup and view all the answers

A MAC address is a unique identifier assigned to each network interface controller (NIC) and can be changed without affecting network communication.

<p>False (B)</p> Signup and view all the answers

An IP address uniquely identifies a device on a network and consists of a network address and a host address.

<p>True (A)</p> Signup and view all the answers

IPv6 addresses are represented by 32-bit hexadecimal values, providing a significantly larger address space compared to IPv4.

<p>False (B)</p> Signup and view all the answers

Network-based firewalls are implemented solely in software and protect only the host operating system they run on

<p>False (B)</p> Signup and view all the answers

A firewall's only function is to block unwanted traffic.

<p>False (B)</p> Signup and view all the answers

The Application Layer of the OSI model does NOT directly interact with the end-user; instead, it provides services to other layers.

<p>False (B)</p> Signup and view all the answers

IDS/IPS systems are positioned outside the firewall to analyze traffic before it enters the network.

<p>False (B)</p> Signup and view all the answers

TCP guarantees data delivery through a 'best-effort' approach, with no error correction mechanisms.

<p>False (B)</p> Signup and view all the answers

MAC addresses operate at the Network Layer of the OSI model to route data packets.

<p>False (B)</p> Signup and view all the answers

IPv4 addresses consist of 4 octets, each represented by a decimal number between 0 and 256.

<p>False (B)</p> Signup and view all the answers

Intrusion detection or prevention systems are exclusively hardware tools and cannot be implemented as software.

<p>False (B)</p> Signup and view all the answers

The OSI model describes five layers that computer systems use to communicate over a network.

<p>False (B)</p> Signup and view all the answers

MAC addresses identify every device on a network.

<p>True (A)</p> Signup and view all the answers

Ip address consist of 3 parts, Network Address, Host Address and Subnet Mask.

<p>False (B)</p> Signup and view all the answers

IPv4 and IPv8 are types of IP Addresses.

<p>False (B)</p> Signup and view all the answers

Flashcards

What is a Firewall?

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Types of Firewalls

A firewall installed on an individual system; Network Based use both hardware and software, operating at the network level.

What are IDS/IPS?

A hardware or software tool placed between the internet and firewall, alerting and preventing outside attacks.

OSI Model

A conceptual model that characterizes and standardizes the communication functions of a computing system without regard to their underlying internal structure and technology.

Signup and view all the flashcards

Mac Address

Each device on a network has a unique identifier.

Signup and view all the flashcards

IP Address

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

Signup and view all the flashcards

Types of IP Address

The two types are IPv4 and IPv6.

Signup and view all the flashcards

Study Notes

Firewalls Explained

  • A firewall is used to maintain network security.
  • Firewalls can be either hardware or software.
  • Firewalls prevent unauthorized access to a private network by filtering information that is received from the internet.
  • Firewalls block unwanted traffic and allow wanted traffic.

Firewall Types

  • Host-based firewalls are software firewalls installed on a system.
  • Network-based firewalls combine both hardware and software and operate at the network area.

IDS/IPS Defined

  • Intrusion Detection/Prevention Systems are hardware/software tools.
  • They are placed between the internet and the firewall.
  • They alert and prevent a network from outside attacks including viruses, malware, and hackers.
  • They monitor traffic flowing through a network.

OSI Reference Model

  • The OSI Model is also known as Open System Interconnect.
  • It describes seven layers that computer systems use to communicate over a network.
  • These layers include Application, Presentation, Session, Transport, Network, Data Link, and Physical.

MAC Address

  • MAC Addresses identify every device on a network.

IP Address

  • Internet Protocols (IP) serve as identifiers for computers or devices on a network.
  • IP addresses consist of a Network Address and a Host Address.

IP Address Types

  • IPv4
  • IPv6

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser