Module 09: Firewalls Exam ECSS

Descripción

Module 09: Firewalls Exam ECSS
Alejandro López Villar
Test por Alejandro López Villar, actualizado hace más de 1 año
Alejandro López Villar
Creado por Alejandro López Villar hace más de 4 años
7
0

Resumen del Recurso

Pregunta 1

Pregunta
Firewall is a [blank_start]hardware or software[blank_end] or [blank_start]combination[blank_end] of both designed to prevent unauthorized access
Respuesta
  • hardware or software
  • combination

Pregunta 2

Pregunta
Número de NIC`s bastion - [blank_start]1[blank_end] Screen/DMZ - [blank_start]2 o 3[blank_end] Multil - [blank_start]several[blank_end]
Respuesta
  • 1
  • 2 o 3
  • several

Pregunta 3

Pregunta
ROLES OF FIREWALLS IN NETWORK: [blank_start]SINGLE POINT:[blank_end] todo tráfico ha de pasar por allí [blank_start]CONTROLLED TRAFFIC[blank_end] : mirar credenciales (user-pass) [blank_start]LOGGED TRAFFIC[blank_end]: se guardan logs de todo lo que pasa
Respuesta
  • SINGLE POINT:
  • CONTROLLED TRAFFIC
  • LOGGED TRAFFIC

Pregunta 4

Pregunta
Firewalls: filter the network traffic based on source or destination [blank_start]addresses and ports[blank_end] perform User [blank_start]Authentication[blank_end] Prevent Network from [blank_start]scanning[blank_end] Perform [blank_start]NAT[blank_end] Filtering [blank_start]services and packets[blank_end]
Respuesta
  • addresses and ports
  • Authentication
  • scanning
  • services and packets
  • NAT

Pregunta 5

Pregunta
Firewall Architecture [blank_start]Bastion Host: The bastion host[blank_end] designed for defending the network against attacks. It acts as a mediator between inside and outside networks. [blank_start]Screened Subnet: A screened subnet[blank_end] is a protected network created with a two- or three- homed firewall behind a screening firewall, and is a name commonly used to refer to the [blank_start]DMZ[blank_end]. When using a three-homed firewall, connect the first interface to the Internet, the second interface to the DMZ, and the third to the intranet. The advantage of screening a subnet away from the intranet is that public requests can be responded to without allowing traffic into the intranet. [blank_start]Multi-homed Firewall:[blank_end] A multi-homed firewall is a node with multiple NICs that connects to two or more networks. Connect each interface to the separate network segments logically and physically. A multi-homed firewall helps in increasing efficiency and reliability of an IP network.
Respuesta
  • Bastion Host: The bastion host
  • Screened Subnet: A screened subnet
  • Multi-homed Firewall:
  • DMZ

Pregunta 6

Pregunta
1 firewall - [blank_start]bastion[blank_end] 2 o 3 firewall- [blank_start]Screened Subnet o DMZ.[blank_end] multi NIC`s conecting several networks - [blank_start]Multi-home firewall[blank_end]
Respuesta
  • bastion
  • Screened Subnet o DMZ.
  • Multi-home firewall

Pregunta 7

Pregunta
LEE CON DETENIMIENTO TIPOS DE FIREWALL Packet Filtering Firewall OSI: Layer 3 Network TCP/IP: Red/capa2 Mira los puertos, las ip, los protocolos, intrfaces etc || reglas de filtrado NO MIRA DENTRO DEL PAQUETE Circuit-Levek Gateaway Firewall OSI: Layer 5 Session TCP/IP: APP capa/4 comprueban TCP Handshaking (secuencia ), que la sesión sea legítima No filtran paquetes individuales hide information about the private network they protect (supongo que esto todos) Se denomina GW ya que los paquetes cuando se pasan y son recibidos parece que se han originado en ese GW Application-Level Firewall / Proxy Server OSI: APP layer , 7 al ser en la app level, puede examinar comanos, como post y get de http SE MIRA DENTRO DEL PAQUETE Y SE RECREAR/HACE OTRO NUEVO IMPORTANTE: si los paquetes de una app que se recibe no pueden usar proxy, se descartan. Statefull Multilayer Inspection Firewall OSI: app, session, network Combinaciónde Packet, Circuit gateway and App firewalls Determina si la sesión es genuina, se evalua los contenido del paquete y se aplican reglas de filtrado Añade de manera dinámica reglas en función a la comunicación que recibe EJEPLO: FTP que se conect al 21 y transferencia en 20. TRANSFORMA y crea una regla para que ene lugar del 20 se use un puerto aleatorio CISCO PIX es este tipo de firewall Proporciona logs y tracks de esas transformaciones ROLES OF FIREWALLS IN NETWORK: SINGLE POINT: todo tráfico ha de pasar por allí CONTROLLED TRAFFIC : mirar credenciales (user-pass) LOGGED TRAFFIC: se guardan logs de todo lo que pasa
Respuesta
  • True
  • False

Pregunta 8

Pregunta
Esquema FIREWALLS Capa OSI
Respuesta
  • none

Pregunta 9

Pregunta
filtra por direccion/puertos/interfaces - [blank_start]Packet firewall[blank_end] mira el 3 HANDSHAKE de TCP - [blank_start]Circuit-Levek Gateaway Firewall[blank_end] abre los paquetes y es un proxy - [blank_start]Application-Level Firewall / Proxy Serve[blank_end]r hace todo lo demas y además crear reglas automáticas - [blank_start]Statefull Multilayer Inspection Firewall[blank_end]
Respuesta
  • Packet firewall
  • Circuit-Levek Gateaway Firewall
  • Application-Level Firewall / Proxy Serve
  • Statefull Multilayer Inspection Firewall

Pregunta 10

Pregunta
Limitaciones de los FIREWALL:
Respuesta
  • son el primer vector del ataque
  • no pueden hacer nada contra los backdoor attacks (ya esta el atacante instalado en la red)
  • podría generar bottleneck si mal configurado
  • podría impedir el paso de usuarios o tráfico legítimo si mal configurado
  • no protegen de ataques del interior

Pregunta 11

Pregunta
BASTION (en un firewall puede haber uno o varios bastiones) especial diseñado para aguantar [blank_start]ataques[blank_end] será quizás el ún[blank_start]ico host conectado directamente a la red[blank_end] junto con quizás uno de los routers configurado con [blank_start]servicios limitados[blank_end] y solo los extrictamente necesarios. si el atacante gana acceso al bastion, accede a toda la red - se configura habitualemente en algunas topologías como cabeza de turco para ganar tiempo en un ataque - se conoce como perimeter network - en una DMZ que no tiene data sensible - packet filtering y proxy services en entornos cloud se ubica como punto de entrada al cloud y se denomina bastion de salto
Respuesta
  • ataques
  • servicios limitados
  • ico host conectado directamente a la red

Pregunta 12

Pregunta
PRINCIPIOS BASICOS PARA CREAR UN BASTION - minimos [blank_start]privilegios[blank_end] y mínimos [blank_start]servicios[blank_end] - siempre listo para ser [blank_start]comprometido[blank_end] - ubicar entre el [blank_start]servidos interno y la red exterior[blank_end] - los admin deben ser [blank_start]alertados[blank_end] (via mensaje) si algo sucede - si el bastion cae, los servidores interiores must [blank_start]verify services provided by the bastion[blank_end]
Respuesta
  • privilegios
  • servicios
  • servidos interno y la red exterior
  • alertados
  • verify services provided by the bastion
  • comprometido

Pregunta 13

Pregunta
AUDITANDO EL BASTION create a [blank_start]benchmark or baseline[blank_end] for performance measurement [blank_start]IPSentry[blank_end] can be used to monitor and send alerts [blank_start]compare every audit[blank_end] is performed with the baseline to know how the bastions handles situation and how secure it is
Respuesta
  • benchmark or baseline
  • IPSentry
  • compare every audit

Pregunta 14

Pregunta
TIPOS DE BASTION: [blank_start]SINGLE-HOMED[blank_end] - one interface - all the traffic is routed throught the bastion [blank_start]MULTI-HOMED[blank_end] - at least two interfaces - capable of separating interanl and external networks [blank_start]INTERNAL BASTION HOST[blank_end] - inside internal network - pueden ser single or multi homed - the internal interfaces (from host) comunicate with the internal bastion - los del interior suelen proveer servicios como mail o ftp - los externos son fundamentalmente de protección [blank_start]NON-ROUTING DUAL-HOME HOSTS[blank_end] - at least dual home topology -multiple network interfaces NOT INTERACT WITH EACH OTHER [blank_start]VICTIM MACHINES[blank_end] - para probar apps/servicios que no son del todo conocidadas [blank_start]EXTERNAL SERVICES HOST[blank_end] - para servicios exclusivos de internet - visibles para todos (imagina un servidos de pagina que aloja la página de la compañia) [blank_start]ONE-BOX FIREWALLS[blank_end] - no hay red de firewall, este host es el único firewall - se necesita asegurar la absoluta seguridad de este host
Respuesta
  • SINGLE-HOMED
  • MULTI-HOMED
  • INTERNAL BASTION HOST
  • NON-ROUTING DUAL-HOME HOSTS
  • VICTIM MACHINES
  • EXTERNAL SERVICES HOST
  • ONE-BOX FIREWALLS

Pregunta 15

Pregunta
Screened subnet se conoce tambien como
Respuesta
  • DMZ
  • Tri-home firewall

Pregunta 16

Pregunta
qué es un DMZ is a [blank_start]computer host[blank_end] (bastion) or [blank_start]small nwtwork[blank_end] (servidores) inserted as a "neutral zone" betwen company lan and internet the firewall within the DMZ screened subnet is also know as thress-pronge or [blank_start]tri-home firewall[blank_end] - it is conected to three distinct networks and wit a diferent nic for each network - the internet - the DMZ subnet - the secure lan or intranet
Respuesta
  • computer host
  • small nwtwork
  • tri-home firewall

Pregunta 17

Pregunta
Major beneficts of DMZ - adds [blank_start]security[blank_end] - exploits if discovered can not [blank_start]be exploited[blank_end] - no [blank_start]single point[blank_end] of failure
Respuesta
  • security
  • be exploited
  • single point

Pregunta 18

Pregunta
Formas de crear un DMZ [blank_start]- tri-home firewall[blank_end]: 3 nics; internet, dmz, lan - [blank_start]sandwich DMZ:[blank_end] fire - dmz - firewall -- internet -- no ideal ya que si cae el priner host(firewall) se compromete la nic que conecta a internet
Respuesta
  • - tri-home firewall
  • sandwich DMZ:

Pregunta 19

Pregunta
PROXY SERVERS - [blank_start]intermediary[blank_end] servers betwen the client and server - worl as [blank_start]shields to hide[blank_end] the lan ---hide IP from users - --hide lan topology --- capable of encrypting information --- increase anonymity in mail - to send and recive packets from [blank_start]specific applications[blank_end] - [blank_start]filtering[blank_end] (ACL, BLACKLIST IP, etc ) --- restrictions task --- prevent malicious content enter the server --- offers user authentication - as [blank_start]cache[blank_end] for data request repeatedly Hoy se usan sobre todo para evitar que los usuarios salgan de la lan hacia internet a visitar ciertas IP`s IMPORTANTE ¿cuál es la diferencia clave entre un proxi que hace filtering y una app que filtra packetes? -- que el proxy [blank_start]si conoce la app[blank_end] que envia los paquetes y puede discriminar por esa categoría también. Proxi servers work at the app layer. if its act as gattewat for packets can be named [blank_start]application gateway[blank_end]
Respuesta
  • intermediary
  • shields to hide
  • specific applications
  • filtering
  • cache
  • si conoce la app
  • application gateway

Pregunta 20

Pregunta
¿Como funcionan un proxy? internal host request proxy [blank_start]examines the header and packet[blank_end] based in a rule proxy [blank_start]reconstructs[blank_end] the packet with a diferent source ip address ---transmits the packet that conceals the actual end user if data is returned : examines, reconstructed and [blank_start]send to the source computer[blank_end] this type of service increase the secirity of the network as [blank_start]no packets can go straight[blank_end] fromthe client to the the destony server
Respuesta
  • examines the header and packet
  • reconstructs
  • no packets can go straight
  • send to the source computer

Pregunta 21

Pregunta
LEE CON ATEMCIÖPN Proxy Server-to-Proxy Server Linking Within an organization, linking of proxy server provides a facility to run a proxy server as a local cache on behalf of a department. Each individual department has control over the server and cache. For example, a departmental proxy server might be permitted all URL requests. The organizational proxy server, as corporate policy, might be set to reject all URL requests for specific online publications.
Respuesta
  • True
  • False

Pregunta 22

Pregunta
examina data, reestructura el paquete - [blank_start]proxy[blank_end] allow / block, examina routing (destino, origen etc) - [blank_start]filter[blank_end]
Respuesta
  • proxy
  • filter

Pregunta 23

Pregunta
mira y escribe las difeencias clave
Respuesta
  • data
  • log
  • restructures
  • network
  • routing
  • header
  • filter
  • pass

Pregunta 24

Pregunta
mira el paquete- [blank_start]firewall[blank_end] solo mira el header - [blank_start]filter[blank_end] reescructura el paquete - [blank_start]firewall[blank_end] permite o niega el paso - [blank_start]filter[blank_end] crea detallados logs dado que pueden ver el paquete - [blank_start]firewall[blank_end] solo crea logs acerca del IP routing/header - [blank_start]filter[blank_end] si fallan la comunicación se detiene - [blank_start]firewall[blank_end] si fallan puede que se de la circustancia que todo se permita o se niegue - [blank_start]filter[blank_end]
Respuesta
  • firewall
  • filter
  • firewallf
  • filterr
  • firewallll
  • filterll
  • firewalllll
  • filterllll

Pregunta 25

Pregunta
TYPES OF PROXY SERVERS NOTA todo proxy que no sea puerto 80 y hhtp es considerado de una forma y otra application proxy [blank_start]TRANSPARENT[blank_end]. transparente para el usuario port 80 [blank_start]NON TRANSPARENT/ EXPLICIT[blank_end] requieres configuring each client program has to be se up to route all request to a single port [blank_start]APPLICATION / APP LEVEL GATEWAY[blank_end] works as a proxy server filters connections for especific services/apps/protocols a ftp proxy will allow traffic while other services will be blocked good at logging reduce load as they are capble of caching perform user level authenticationa [blank_start]SOCKS[blank_end] it is considered as a internet toolkit allows only TCP-based applications to execute on proxy servers. it is called because use sockets internally to keep track of the clients individual connections. request clients and if it valid, bind the request to the information exchange, usually a HTTP ANONYMOUS nada que añadir [blank_start]REVERSE[blank_end] situated closer to the server optimize content by compressing in order to speed up loading times client es unaware acts as intermediate server, sits betwen client and actual server
Respuesta
  • TRANSPARENT
  • NON TRANSPARENT/ EXPLICIT
  • APPLICATION / APP LEVEL GATEWAY
  • SOCKS
  • REVERSE

Pregunta 26

Pregunta
LIMIRACIONES PROXY SERVERS [blank_start]point of failure[blank_end] in an event of attack if not properly secured because data is reroute web pages can [blank_start]load slowy[blank_end] [blank_start]personal information[blank_end] is passed throught external server can be [blank_start]accessed and compromised[blank_end]
Respuesta
  • point of failure
  • load slowy
  • accessed and compromised
  • personal information

Pregunta 27

Pregunta
NAT [blank_start]separates[blank_end] IP into two sets and enables LAN to use the [blank_start]addresses for internal and external traf[blank_end]fic m[blank_start]odify[blank_end] the packets that routers sends and h[blank_start]ide the lan[blank_end] has the ability to change the address of the packet and make as from valid address
Respuesta
  • addresses for internal and external traf
  • separates
  • odify
  • ide the lan

Pregunta 28

Pregunta
LEE CON ATENCIÓN SCHEMES FOR NAT assigning one externar host address for each internat address. dynamically allocate an external host address without modifiying the port numbers port mapping so multiple internal machines use the same external address dynamically allocate external host addresss and port to pair each time an internal host initates a connection. this is the most efficiente ADVANTAGES AND DISADVANTAGES enforce firewalls control restricts incoming traffic to ony packets that are part of a current interaction hide the internal lan interferes with encrytion and authentication dynamic may interfere with packet filtering.
Respuesta
  • True
  • False

Pregunta 29

Pregunta
VPN Virtual Private Network A VPN is an attempt to combine both the [blank_start]advantages of public and private[blank_end] networks A VPN is a network that provides [blank_start]secure access to the network[blank_end] through the internet. Used for connecting wide area networks (WAN). It employs [blank_start]encryption and integrity[blank_end] protection helping you to use a public network as a private network. A VPN performs encryption and the decryption outside the packet-filtering perimeter to [blank_start]allow the inspection of packets[blank_end] coming from other sites. A VPN [blank_start]encapsulates[blank_end] packets sent over the Internet. VPNs have no relation to firewall technology, but firewalls are convenient for adding VPN features as they help in providing secure remote services.
Respuesta
  • advantages of public and private
  • secure access to the network
  • encryption and integrity
  • allow the inspection of packets
  • encapsulates

Pregunta 30

Pregunta
HONEYPOT A honeypot is a system that is intended to [blank_start]attract and trap people[blank_end] who try unauthorized or illicit utilization of the host system. Whenever there is any interaction with a honeypot, it is most likely to be a [blank_start]malicious activity.[blank_end] They are a highly flexible tool with many different security applications. Some honeypots can be used to help pre[blank_start]vent attacks[blank_end] Others can be used to det[blank_start]ect attacks[blank_end] While a few honeypots can be used for infor[blank_start]mation gathering and research[blank_end] Any existing system can be "honeypot-ized." For example, on WinNT, it is possible to rename the default administrator account and then create a dummy account called "administrator" with no password. WinNT allows extensive logging of a person's activities, so this honeypot tracks users who are attempting to gain administrator access and exploit that access.
Respuesta
  • attract and trap people
  • malicious activity.
  • vent attacks
  • ect attacks
  • mation gathering and research

Pregunta 31

Pregunta
TYPES OF HONEYPOTS Low-intereaction - [blank_start]emulating[blank_end] servicies and programs - if attacker does something unexpected, they ge[blank_start]nerate an error[blank_end] - catures li[blank_start]mited information[blank_end] - [blank_start]specter, honeyed, kfsensor[blank_end] High-interaction - entire system of computers , [blank_start]real programs and apps[blank_end] - let the attacker in, but outbound is tig[blank_start]htlly controlled[blank_end] - captures far [blank_start]more information[blank_end]: eje: keystrokes - [blank_start]symantec decoy server, honeynets[blank_end]
Respuesta
  • emulating
  • real programs and apps
  • nerate an error
  • htlly controlled
  • mited information
  • more information
  • specter, honeyed, kfsensor
  • symantec decoy server, honeynets

Pregunta 32

Pregunta
LEE CON ATENCIÓN BYPASSING FIREWALLS - scan ports , find a weakness - some firewalls will uniqueelu identify themselves usion simple ports scans: ejeplo: MS proxy server, TCP 1080 and 1745
Respuesta
  • True
  • False

Pregunta 33

Pregunta
FIREWALKING Firewalking is a method used to [blank_start]collect information about remote network[blank_end]s behind firewalls. Firewalking involves sending TCP or UDP packets into the firewall with [blank_start]TTL value is one hop greater[blank_end] than the targeted firewall. If the packet makes it through the gateway, the system forwards it to the next hop, where the TTL equals one and prompts an ICMP error message at the point of rejection with a 'ITTL exceeded in transit" message. Using this method, possible access to the firewall can be determined if successive probe packets are sent. It has two phases: a net[blank_start]work discovery phase[blank_end] a sca[blank_start]nning phase.[blank_end] The scanning phase requires three hosts: [blank_start]Firewalking Host:[blank_end] The firewalking host is the system outside the target network [blank_start]Gateway Host[blank_end]: The gateway host is the suspected firewall system on the target network, [blank_start]Destination Host:[blank_end] The destination host is the target system on the target network to which the data packets are addressed.
Respuesta
  • collect information about remote network
  • TTL value is one hop greater
  • work discovery phase
  • nning phase.
  • Firewalking Host:
  • Gateway Host
  • Destination Host:

Pregunta 34

Pregunta
[blank_start]Source Routing[blank_end] Using this technique, the sender of the packet designates the route that a packet should take through the network, in such a way that the designated route should bypass the firewall node. Using this technique, the attacker can evade firewall restrictions. Source routing takes two approaches: loose source routing In loose source routing, the sender specifies [blank_start]on or more stages[blank_end] the packet must go through strict source routing, the sender specifies the [blank_start]exact route the packet must go[blank_end] through. BYPASS BLOCKED SITES USING URL Inted of using the url tyoe its IP this method fails if the software blocking the web tracks also its IP BYPASS BLOCKED SITES USING ANONYMOUS WEBSITE SURFING SITES usar paginas web que nos devuelvel la página que está baneada BYPASS BLOCKED SITES USING A PROXY usar el proxy que viene por defecto en los navegadores. es sumilar a las dos últimas opciones
Respuesta
  • Source Routing
  • on or more stages
  • exact route the packet must go
Mostrar resumen completo Ocultar resumen completo