Firewall or Wall-of-Fire?
IPsec(xual) Tension
Lil more of IPsec
Stranger Danger
Random Stuff
100

This type of firewall configuration uses a "DMZ" to increase security

Screen Subnet
100

This IPSec mode is used for host-to-host connections

Transport Mode

100

This type of VPN is used for a mobile user looking to connect to secure materials remotely

Remote Access

100

This type of attack attempts to shutdown a network, computer, or process.

DoS

100

This Information source in terms of IDS operate on information collected within the computer system

Host based IDS

200

This type of host performs authentication and proxy functions

Bastion Host

200

This SA parameter allows the destination to select the correct SA under which the received packet will be processed

Security Parameters Index

200

This VPN setup the end host uses software to connect to VPN

End host to gateway

200

This type of attacker has the ability to send packets to a machine over a network

Remote to Login

200

This type of IPSec mode encrypts the original IP header

Tunnel Mode

300

This mechanism to in Packet-Filtering Routers is used when you want packet-by-packet detection

Stateless Filter

300

This traffic security protocol protects IP Headers as well as the higher layer payload

Authentication Header

300

This part of IKE negotiates IPSec SA parameters

Phase 2

300

This type of intruder is a legitimate user who accesses resources for which he is not authorized, or authorized but misuses his privileges

Misfeasor

300

This type of firewall has the advantage of powerful logging features

Application-level Gateway

400

This Firewall selection recommendation provides password-level protection for remote users

User Authentication
400

This technique is used to conceal actual length of payload

Padding

400

This mechanism helps with clogging attacks

Cookie

400

This component of the IDS model sends alerts to the Manager

Analyzer

400

This type of ruled based detection detect unusual usage from normal usage patterns

Anomaly Detection

500

This Firewall characteristic determines the types of Internet services that can be accessed, inbound or outbound

Service control

500

This service uses a fixed window size to know which packets to discard and which to accept

Anti-Replay service

500

This implementation of IPSec is underneath an exisiting implementation of the IP Stack

Bump-in-the-stack

500

This principle states the following: Systems should remain secure even when the attacker knows all internal details of the system

Kerkhoff's

500

This type of Firewall selection changes the source address of all traffic leaving your network, preventing hackers from IP spoofing.

FW must contain NAT