Uploaded by pburleigh

3.3.6 - Network Appliances - Guided Notes Answers

advertisement
Cybersecurity Guided Notes (ANSWER KEY)
Lesson 3.3.6 - Network Appliances
1. Match the following
A. Jump Server
B
An intermediate point between the user and
the service they are trying to access
B. Proxy Server
C
Identifies when an attack is occurring and then
notifies an end user
C. NIDS
A
A network system used to access and manage
devices within a security zone
D. NIPS
D
Stops an attack from happening
A. Signature-based
A
Hashes data and checks these hashes against
known malicious threats
B. Behavior-based
C
A system recognizes when something is not like
the rest of the traffic
C. Anomaly-based
B
A system looks for instructions that are
potentially malicious
2. Match the following
3. What is an HSM?
A physical computing device that safeguards and manages digital keys, performs encryption and
decryption functions for digital signatures, strong authentication and other cryptographic functions
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
1
4. Match the following
A. Sensors
B
Acquires and interprets data
B. Collectors
C
A device that serves other devices
C. Aggregators
A
Detects information
5. What is a web application firewall?
A firewall designed to protect the servers for web applications
6. What is the difference between stateful and stateless firewalls?
Stateful firewalls monitor and detect states of all traffic, whereas stateless firewalls focus on individual
packets, using predetermined rules to filter the traffic
7. What is Unified threat management?
UTM is when multiple firewall tools are combined into one tool
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
2
8. What can content/URL filtering help prevent?
Spam and phishing attacks
9. What are some advantages/disadvantages of hardware firewalls? Software firewalls?
Hardware Pros: No effect on system performance or speed, harder to disable by malicious software, a
single hardware firewall can protect an entire network
Cons: More difficult to configure, all outgoing traffic is marked as safe, typically costs more than software
firewalls, takes up physical space
Software Pros: More affordable for single machines or small offices, easier to configure, portable
Cons: Use system resources, slowing down machines, can’t be configured to mask IP addresses
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
3
Download