Cnns p2
Cnns p2
SSL/TLS IPSec
Feature
Layer Application Layer Network Layer
|
7. Explain the concept of a Virtual Private Network (VPN).
A VPN creates a secure, encrypted connection over a public
network, ensuring privacy and security.
Key points:
- Encrypts data to protect against eavesdropping.
- Masks the user's IP address for anonymity.
- Commonly used for secure remote work.
8. Describe the functioning of secure tunneling in VPNs.
Secure tunneling in VPNs encapsulates data packets within
encrypted protocols.
Functioning:
- Data is encrypted before transmission.
- Encrypted data travels through a 'tunnel' over the public
internet.
- Protocols used: PPTP, L2TP, IPSec.
9. Define a firewall and its role in network security.
A firewall is a security device or software that monitors
and controls incoming and outgoing network traffic.
Role:
- Blocks unauthorized access while permitting legitimate
communication.
- Filters traffic based on predefined security rules.
- Can be hardware-based, software-based, or both.
10. Differentiate between different types of firewalls.
Types of Firewalls:
- **Packet-Filtering Firewalls**: Inspect individual
packets based on rules.
- **Stateful Inspection Firewalls**: Monitor active
connections and track their state.
- **Application-Level Gateways (Proxy Firewalls)**:
Filter traffic at the application layer.
- **Next-Generation Firewalls (NGFW)**: Combine
traditional firewall functions with advanced features like
intrusion prevention.
11. Explain the importance of packet filtering in firewalls.
Packet filtering is a firewall technique that controls data
flow based on predefined rules.
Importance:
- Blocks unauthorized IP addresses or ports.
- Filters out harmful traffic before it reaches the internal
network.
- Provides a basic layer of security with minimal resource
usage.
12. Describe the concept of stateful inspection in firewalls.
Stateful inspection monitors the state of active connections
and makes decisions based on the context of the traffic.
Key points:
- Tracks the state and characteristics of network
connections.
- Allows or blocks traffic based on the connection state
(e.g., established, new).
- More secure than basic packet filtering.
13. Explain how firewalls prevent unauthorized access.
Firewalls prevent unauthorized access by:
- **Blocking suspicious traffic**: Based on IP addresses,
protocols, or ports.
- **Setting access control rules**: Only trusted sources
are allowed.
- **Monitoring traffic patterns**: Detecting and stopping
unusual activity.
14. Describe the purpose of Intrusion Detection Systems
(IDS).
An IDS monitors network or system activities for malicious
activities or policy violations.
Purpose:
- Identifies potential threats or breaches.
- Alerts administrators of suspicious activities.
- Analyzes traffic patterns to detect anomalies.
15. Compare Intrusion Detection Systems (IDS) and Intrusion
Prevention Systems (IPS).