Cybersecurity Guided Notes (ANSWER KEY) Lesson 3.3.6 - Network Appliances 1. Match the following A. Jump Server B An intermediate point between the user and the service they are trying to access B. Proxy Server C Identifies when an attack is occurring and then notifies an end user C. NIDS A A network system used to access and manage devices within a security zone D. NIPS D Stops an attack from happening A. Signature-based A Hashes data and checks these hashes against known malicious threats B. Behavior-based C A system recognizes when something is not like the rest of the traffic C. Anomaly-based B A system looks for instructions that are potentially malicious 2. Match the following 3. What is an HSM? A physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions Copyright © 2022 Cyber Innovation Center All Rights Reserved. Not for Distribution. 1 4. Match the following A. Sensors B Acquires and interprets data B. Collectors C A device that serves other devices C. Aggregators A Detects information 5. What is a web application firewall? A firewall designed to protect the servers for web applications 6. What is the difference between stateful and stateless firewalls? Stateful firewalls monitor and detect states of all traffic, whereas stateless firewalls focus on individual packets, using predetermined rules to filter the traffic 7. What is Unified threat management? UTM is when multiple firewall tools are combined into one tool Copyright © 2022 Cyber Innovation Center All Rights Reserved. Not for Distribution. 2 8. What can content/URL filtering help prevent? Spam and phishing attacks 9. What are some advantages/disadvantages of hardware firewalls? Software firewalls? Hardware Pros: No effect on system performance or speed, harder to disable by malicious software, a single hardware firewall can protect an entire network Cons: More difficult to configure, all outgoing traffic is marked as safe, typically costs more than software firewalls, takes up physical space Software Pros: More affordable for single machines or small offices, easier to configure, portable Cons: Use system resources, slowing down machines, can’t be configured to mask IP addresses Copyright © 2022 Cyber Innovation Center All Rights Reserved. Not for Distribution. 3