This type of firewall filters traffic based on IP addresses and port numbers.
What is a packet-filtering firewall?
his function tracks the state of active connections and makes decisions based on the context of traffic.
What is stateful inspection?
This configuration defines what traffic is allowed or denied through the firewall.
What are firewall rules?
This protocol is often used for secure web browsing.
What is HTTPS?
This term refers to the set of rules governing what network traffic is permitted.
What are security policies?
This firewall operates at the application layer to inspect and filter traffic based on the application data.
What is an application firewall?
This is the process of allowing or denying traffic based on predefined rules
What is filtering?
The default action of a firewall if no rules match the traffic.
What is the implicit deny?
This protocol typically runs over port 80.
What is HTTP?
This policy allows all traffic unless explicitly denied.
What is an allow-all policy?
This type of firewall uses a proxy server to mediate traffic between a user and the internet
What is a proxy firewall?
This function allows a firewall to block or allow traffic based on user-defined criteria.
What is rule-based filtering?
This process involves regularly updating firewall rules to adapt to new threats
What is rule management?
This protocol is used for email transmission and usually operates on port 25.
What is SMTP?
This type of policy specifies rules for different types of users or groups.
What is user-based access control?
This hybrid firewall combines the features of packet-filtering and stateful firewalls
What is a stateful inspection firewall?
This feature logs traffic data for analysis and monitoring purposes.
What is logging?
This is a common interface used to configure firewall settings
What is a web-based GUI or command-line interface?
This protocol is used for secure file transfers and operates over port 22.
What is SFTP?
This term describes the procedure for reviewing and updating firewall policies regularly.
What is policy review?
This type of firewall is typically used to protect the entire network by blocking unwanted traffic at the network perimeter.
What is a network firewall?
This process identifies and blocks known threats by matching against a database of signatures.
What is intrusion detection?
This type of rule allows traffic from trusted sources while blocking all others.
What is a whitelist?
This protocol is used for remote management and operates on port 22.
What is SSH?
This strategy focuses on minimizing the attack surface by reducing open ports and services.
What is hardening?