Types of Firewalls
Firewall Functions
Configuration Basics
Common Protocols
Firewall Security Policies
100

This type of firewall filters traffic based on IP addresses and port numbers.

What is a packet-filtering firewall?

100

his function tracks the state of active connections and makes decisions based on the context of traffic.

What is stateful inspection?

100

This configuration defines what traffic is allowed or denied through the firewall.

What are firewall rules?

100

This protocol is often used for secure web browsing.

What is HTTPS?

100

This term refers to the set of rules governing what network traffic is permitted.

What are security policies?

200

This firewall operates at the application layer to inspect and filter traffic based on the application data.

What is an application firewall?

200

This is the process of allowing or denying traffic based on predefined rules

What is filtering?

200

The default action of a firewall if no rules match the traffic.

What is the implicit deny?

200

This protocol typically runs over port 80.

What is HTTP?

200

This policy allows all traffic unless explicitly denied.

What is an allow-all policy?

300

This type of firewall uses a proxy server to mediate traffic between a user and the internet

What is a proxy firewall?

300

This function allows a firewall to block or allow traffic based on user-defined criteria.

What is rule-based filtering?

300

This process involves regularly updating firewall rules to adapt to new threats

What is rule management?

300

This protocol is used for email transmission and usually operates on port 25.

What is SMTP?

300

This type of policy specifies rules for different types of users or groups.

What is user-based access control?

400

This hybrid firewall combines the features of packet-filtering and stateful firewalls

What is a stateful inspection firewall?

400

This feature logs traffic data for analysis and monitoring purposes.

What is logging?

400

This is a common interface used to configure firewall settings

What is a web-based GUI or command-line interface?

400

This protocol is used for secure file transfers and operates over port 22.

What is SFTP?

400

This term describes the procedure for reviewing and updating firewall policies regularly.

What is policy review?

500

This type of firewall is typically used to protect the entire network by blocking unwanted traffic at the network perimeter.

What is a network firewall?

500

This process identifies and blocks known threats by matching against a database of signatures.

What is intrusion detection?

500

This type of rule allows traffic from trusted sources while blocking all others.

What is a whitelist?

500

This protocol is used for remote management and operates on port 22.

What is SSH?

500

This strategy focuses on minimizing the attack surface by reducing open ports and services.

What is hardening?

M
e
n
u