Technologies, Architecture & Design Flashcards

1
Q

Network Address Translation (NAT)

A

an IPv4 technique used to link private IP addresses to public ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access control list (ACL)

A

Lists of users and their permitted actions. Can be identified by ID, network address, or token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application-based vs. network-based Firewall

A
  • App-based firewalls look at traffic and block/allow actions within applications (even web-connected ones).
  • Network-based firewalls are, um, network-based and look at IP addresses and ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Implicit deny

A

if it isn’t explicitly allowed, then deny it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rule-based management

A

To define desired operational states so that they can be represented as rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN concentrator

A

A VPN concentrator is a way of managing multiple VPN conversations on a network while keeping them isolated from each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPSec

A

IPSEC is a set protocols for securely exchanging packets at the network layer (layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tunnel Mode

A

Tunnel-mode means that the data, as well as source and destination addresses are encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport Mode

A

Transport mode encrypts only the data, allowing an observer to see that a transmission is happening. The original IP header is exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication Headers (AH)

A

Authentication Headers (AH) are a type of header extension that ensure data integrity and authenticity of the data’s origin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encapsulating Security Payload (ESP)

A

Encapsulating Security Payload (ESP) header extensions provide confidentiality but do not help with data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Split Tunnel vs. Full Tunnel

A
  • Split-tunnel VPNs do not route all traffic through the VPN. This helps avoid bottlenecks that might come from encrypting all traffic. -
  • All traffic going over VPN is called a full tunnel VPN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transport Layer Security (TLS)

A

Transport Layer Security (TLS) can be used for VPNs, to exchange keys and create secure tunnels for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Always-on VPN

A

“Always on” VPNs are pre-configured and always on, by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIPS

A

Network-based intrusion prevention systems. NIPS can take automated action to block an attack, as determined by pre-set rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIDS

A

NIDS stands for a network-based intrusion detection system. These detect, log and respond to unauthorized network usage. This can be in real-time or after the fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Signature Based (IDS)

A

An IDS can be signature-based, meaning it detects intrusion based on known signature definitions.

18
Q

Heuristic/Behavioral (IPS/IDS)

A

This means that “normal” behavior is defined, and behavior that is outside of those bounds is considered malicious or bad.

This can have a high false-positive rate

19
Q

Anomaly (IDS)

A

Anomaly-based is similar and looks for traffic that is anomalous based on known “normal” behavior.

20
Q

Inline vs. Passive (IDS)

A

IDS can be inline, meaning it monitors data as it flows through the device, or passive, meaning that it copies off the data and examines it offline.

21
Q

In-Band vs. Out-of-Band (IDS)

A

It can be in-band, meaning that it examines data and can take actions within that system (if something looks bad, don’t send it along). Out-of-band cannot.

22
Q

Security Information and Event Management (SIEM)

A
  • SIEM stands for security information and event management.
  • SIEM systems are hardware and software meant to analyze aggregated security data.
23
Q

Agreggation (SIEM)

A

Aggregation of data: event logs, firewall logs security, application logs.

24
Q

Correlation (SIEM)

A

Correlation, meaning that events or behaviors can be related based on time, common events, etc.

25
Q

Automated Alert and Triggers (SIEM)

A

Automated alerts and triggers: you can set rules to alert you based on certain patterns. Your SIEMS can have automated reactions, too.

26
Q

Time Synchronization (SIEM)

A

SIEMs can render events in UTC and local time(s).

27
Q

Event deduplication (SIEM)

A

SIEMs can remove redundant event info so that the signal-to-noise ratio is better.

28
Q

Data Loss Prevention (DLP)

A

DLP (Data Loss prevention) refers to methods of detecting and preventing unauthorized transfers of data across an organization

29
Q

USB Blocking (DLP)

A

USB blocking: either physically disabling the points, or a software-based solution.

30
Q

Cloud Based (DLP)

A

Cloud-based DLP gets harder, since you have to move _some _data to and from the cloud.

31
Q

E-Mail (DLP)

A

Organizations might disallow or scan email attachments.

32
Q

Network access control (NAC)

A
  • To help large organizations to manage network connections.
  • Network Access Protection (NAP) is the Microsoft option, Network Admission Control (NAC) is the Cisco option.
33
Q

Dissolvable vs. permanent (NAC)

A

NAP or NAC related agents can be permanent deployed to a host. They an also be dissolvable, meaning that they are used (and discarded) on an as-needed basis.

34
Q

Host Health Checks (NAC)

A

Run health checks on a host before letting it connect to the network.

35
Q

Mail Gateway

A
  • Mail gateways are machines that process email packets on a network.

-They also filter spam, manage data loss and handle encryption.

36
Q

Spam Filter

A

Gateways can filter spam through blacklisting known spam sources.

37
Q

Bridge

A
  • Bridges work at the layer 2 level and connect two separate network segments.
  • This can play into security concerns because traffic separation can keep sensitive information more sequestered.
37
Q

SSL/TLS Accelerator

A

Encryption takes time and processing power. SSL/TLS accelerators are dedicated devices that help alleviate encryption bottlenecks within organizations.

38
Q

SSL Decryptor

A

SSL decryptors allow for traffic screening. They’re effectively a man-in-the-middle attack, and decrypt information, check it, and then re-encrypt and forward it.

39
Q

Media Gateway

A

Media gateways are machines meant to handle different media protocols, including translating from one protocol to another.

40
Q

Hardware Security Module

A

Hardware security modules (HSMs) are devices meant to manage or store encryption keys.