Never deploy firewalls hastily. Instead, use careful investigation and planning in the design and use of firewalls. Consider the numerous firewall deployment issues regarding your business needs and network situation.
Some important concerns include deciding:
Which security strategies to integrate
How AAA enforces security
Whether you need reverse proxy
Whether to configure port forwarding
Which bastion host OS to use
How to monitor firewalls and handle log data
How to deal with IDS/IPS false positives and false negatives
How the firewall will interact or interfere with business processes
When is a reverse proxy useful?
To grant outside users access to internal email servers
To support internal users accessing the public Internet
To allow internal users to access external web servers
To offer external entities access to an internal web server
Which of the following is an event found in a firewall log file that is a symptom of a rogue host operating within the private network?
Packets from an unassigned internal address
Packets to an unknown port on an internal host
Packets in a serial grouping, attempting to access a series of ports
Packets that are all exactly the same, directed toward a single target
Which security strategy is based on locking the environment down so users can perform their assigned tasks, but little else?
Creating chokepoints
Diversity of defense
Principle of least privilege
Separation of duties
Which of the following statements is true regarding a reverse proxy?
The reverse proxy server can act as the endpoint for a TLS tunnel.
A reverse proxy cannot be used in conjunction with secured websites.
A reverse proxy can be used with tunnel mode IPSec VPNs.
A reverse proxy cannot support simultaneous SSL tunnels.
Which of the following is the most important feature of a bastion host OS?
Leveraging existing OS administrative knowledge
Inherent ease of use
Resistance to attacks and compromise attempts
Unlimited remote administration
When considering deployment of an IDS or IPS, what is the biggest problem?
Failing anomaly detection
False positives
False negatives
Failing to operate at wire speed
Which of the following is a highly recommended method or technique for keeping firewall logs secure and uncorrupted?
Storing the logs in binary form
Using high-capacity hard drives
Using timestamps
Using WORM drives
Which standard allows a firewall to hand off authentication to a dedicated service hosted on a different system?
IEEE 802.1x
IIEE 802.3
IEEE 802.11
IEEE x801
Which security stance focuses on the use of firewalls as its primary means of controlling communications?
Chokepoint
Universal participation
Fail-safe
Weakest link
Which term describes the deployment of multiple subnets in a series to separate private resources from public?
Diverse
Separation
N-tier
DMZ
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.