0% found this document useful (0 votes) 11 views 4 pages Test_ Info Security Test 1 _ Quizlet © © All Rights Reserved Did you find this document useful?0% found this document useful (0 votes) 11 views4 pages Test - Info Security Test 1 - QuizletOriginal Title:Test_ Info Security Test 1 _ Quizlet Jump to Page You are on page 1of 4 You're Reading a Free Preview Reward Your CuriosityEverything you want to read. Anytime. Anywhere. Any device. No Commitment. Cancel anytime. Review Questions Chapter 6
Firewall acts as a barrier or a filter between the trusted and untrusted networks. The system administrators put a filter to let it check the data from untrusted networks and stop suspicious data from entering the trusted network.
TCP and UDP perform two different functions. TCP is a transport protocol keeping records of the data transferred and notifying the sender about its status while. UDP in involved with the speed of the data and does not care about reporting back. I would prefer TCP personally. There is not transaction involved.
Both are different because of the unique quality of the packet filtering firewall as it notices data packets for the destination, generated source etc. information. The application layer firewall may be incorporating software applications. These applications are incorporated to function as proxies which gives application layer firewall a name of proxy servers as well.
Dynamic filtering has the capability to change its rules according to the packet transfer patterns while static filters has fixed rules. The ability of dynamic filtering to change with the changing circumstances make it more secure.
The stateful inspection is a tabular form of system connections information that is responsible for keeping track of external and internal network connections.
Circuit gateway, unlike a firewall functions at the transport layer level which is used to prevent a direct connectivity between two different networks.
Cache servers are an important resource that saves precious bandwidth by storing the frequently used information that uses network bandwidth on the local cash server. When the user requires this information again, the cache server provides this information without a need to use the network resources to communicate with the actual source.
In the OSI model, different firewalls act as the transport level to confront any external threats to the trusted network.
Different firewalls can also be utilized to function in collaboration with each other, this kind of setup is called a hybrid firewall.
Static packet filtering, application level firewalls, inspection firewalls, dynamic packet filtering firewalls and kernel proxy are the five generations of firewall technology. In my opinion most of them are in the common use even today but depends on the situation and needs of the system security.
Commercial grade firewall appliance is the hardware like a standalone computer and the software application. On the other hand a commercial grade firewall is referred to the actual software application.
The routers that connect computers to the internet are referred to as Residential/SOHO appliances. Their function is to get data from the internet network and filter the data. They are just like stateful firewalls.
When internet data hits the computer the first line of defense are the Residential/SOHO firewalls. The firewall computers are the second line of defense.
Screened host architectures provide a dedicated firewall while screen subnet architectures provides a DMZ which is more secure.
A sacrificial host is defending the network without firewall while a bastion has a firewall. Both are in the frontline to the outer data entering the trusted network.
This is a military term incorporated into network security. It stands for demilitarized zone and is a space where the existence of a trusted network is decided.
The effectiveness of the firewall compared to its cost, its future reliability in accordance to growing network demands and what is not included in the firewall package are the three fundamental enquiries to be made.
It is a kind of identity assurance check for the users who want to become involved with a network. It is a widely supported identity check strategy as compared to TACACS.
A content filter should be placed between the trusted and untrusted network. This filter empowers the administrator to limit access to the content of a specific network.
Virtual Private Network or VPN is a security tool that is used on internet to connect to a private network and make a virtual network. It is becoming more widely used due to the fact that companies can make a virtual network between different of its distinct networks physically away from each other. Which security component separates a trusted network from an untrusted network?"The firewall filters or prevents specific information from moving between the outside (untrusted) network and the inside (trusted) network."
What is the commonly used name for an intermediate area between a trusted network and an untrusted network?(DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall.
What is the primary value of a firewall quizlet?What is the primary value of a firewall? To protect something from unwanted network traffic.
Is a software program that restricts the access of trusted network by the untrusted network?In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
|