Chapter 12 - Network Security Flashcards

1
Q

Defense-in-Depth

A

Defense-in-Depth, is a security concept stating that multiple security controls ensure that a failure in a single control or sometimes even multiple controls, is unlikely to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Surface

A

An organization or device’s Attack Surface consists of the points at which an unauthorized user could gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Zone

A

Security Zones are network segments, physical or virtual network segments, or other components of an infrastructure that are able to be separate from less secure zones through logical or physical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Failure Modes

A

Failure Modes refer to the state in which a device will be once it fails. A fail-open device will allow traffic to continue passing through upon failure while a fail-closed device will no longer allow traffic to pass through after failing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reputation

A

Reputation describes services and data feeds that track IP addresses, domains, and hosts that engage in malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software-Defined Networking (SDN)

A

Software-Defined Networking uses software-based network configuration to control networks. SDN designs rely on controllers that manage network devices and configurations, centrally managing the Software-Defined Network. This allows networks to be dynamically tuned based on performance metrics and other configuration settings, and to be customized as needed in a flexible way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software-Defined Wide Area Network (SD-WAN)

A

A Software-Defined Wide Area Network is a virtual wide area network design that can combine multiple connectivity services for organizations. SD-WAN is commonly used with technologies like Multiprotocol Label Switching (MPLS), 4G and 5G, and broadband networks. SD-WAN can help by providing high availability and allowing for networks to route traffic based on application requirements while controlling costs by using less expensive connection methods when possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Access Service Edge (SASE)

A

Secure Access Service Edge combines virtual private networks, SD-WAN, and cloud-based security tools like firewalls, cloud access security brokers (CASBs), and zero-trust networks to provide secure access for devices regardless of their location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Screened Subnet/DMZ

A

Screened Subnets are network zones that contain systems that are exposed to less trusted areas (often the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a Zero-Trust network, what are the four components of the Control Plane?

A
  1. Adaptive Identity (leverage context-bases authentication that considers data points such as where the user is logging in from or what device they are logging in from)
  2. Threat Scope Reduction (limits the scope of what a subject can do or what access is permitted to a resource limits what can go wrong if an issue does occur)
  3. Policy-Driven Access Control (policy engines rely on policies as they make decisions that are then enforced by the policy administrator and policy enforcement points)
  4. Policy Administrator (executes decisions made by a policy engine)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a Zero-Trust network, what are the four components of the Data Plane?

A
  1. Implicit Trust Zones (allow use and movement once a subject is authenticated by a zero trust policy engine)
  2. Subjects and Systems (devices and users that are seeking access)
  3. Policy Enforcement Points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Access Control (NAC)

A

Network Access Control technologies focus on determining whether a system or device should be allowed to connect to a network. If it passes the requirements set for admission, NAC places it into an appropriate zone. NAC can use a software agent that is installed on the computer to perform these security checks or it can be agentless and run from a browser or by another means without installing software locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Security

A

Port Security is a capability that allows you to limit the number of MAC addresses that can be used on a single port. This prevents problems such as MAC address spoofing, content-addressable memory (CAM) table overflows, and in some cases, plugging in additional devices to extend the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec VPN

A

IPSec VPNs operate at layer 3, require a client, and can operate in either tunnel mode or transport mode. In tunnel mode, entire packets of data sent to the other end of the VPN connection are protected. In transport mode, the IP header is not protected but the IP payload is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL VPN

A

SSL VPNs (although they actually use TLS) can either use a portal-based approach, where users access it via a web page and then access services through that connection, or they can offer a tunnel mode like IPSec VPNs. SSL VPNs can be used without a client installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Full-Tunnel VPN

A

Full-Tunnel VPNs send all network traffic through the VPN tunnel, keeping it secure as it goes to the remote trusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Split-Tunnel VPN

A

Split-Tunnel VPNs only send traffic intended for systems on the remote trusted network through the VPN tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Jump Server

A

Jump Servers are secure and monitored systems used to provide administrators with a way to securely operate in security zones of differing security levels. These servers are typically configured with the tools required for administrative work and is frequently accessed with SSH, RDP, or other remote desktop methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Load Balancer

A

Load Balancers are used to distribute traffic to multiple systems, provide redundancy, and allow for ease of upgrades and patching. Load Balancers typically present a virtual IP (VIP), which clients send service requests to on a service port. The Load Balancer then distributes those requests to servers in a pool or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Proxy Server

A

Proxy Servers accept and forward requests, centralizing the requests and allowing actions to be taken on the requests and responses. They can filter or modify traffic and cache data, and since they centralize requests, they can be used to support access restrictions by IP address or similar requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Forward Proxy

A

Forward Proxies are placed between clients and servers, and they accept requests from clients and send them forward to servers. Since Forward Proxies conceal the original client, they can anonymize traffic or provide access to resources that might be blocked by IP address or geographic location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Reverse Proxy

A

Reverse Proxies are placed between servers and clients, and they are used to help with load balancing and caching of content. Clients can thus query a single system but have traffic load spread to multiple systems or sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Web Filter

A

Web Filters, sometimes called content filters, are centralized proxy devices or agent-based tools that allow or block traffic based on content rules. These can be as simple as conducting URL scanning and blocking specific URLs, domains or hosts, or they may be complex, with pattern matching, IP reputation, and other elements built into the filtering rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Unified Threat Management (UTM)

A

Unified Threat Management devices frequently include firewall, IDS/IPS, anti-malware, URL and email filtering and security, data loss prevention, VPN, and security monitoring and analytics capabilities. The line between UTM and NGFW devices can be confusing, and the market continues to narrow the gaps between devices as each side offers additional features. UTM devices are typically used for an “out of box” solution where they can be quickly deployed and used, often for small to mid-sized organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Web Application Firewall (WAF)

A

Web Application Firewalls are security devices that are designed to intercept, analyze, and apply rules to web traffic, including tools such as database queries, APIs, and other web application tools.

26
Q

Honeypot

A

Honeypots are systems that are intentionally configured to appear to be vulnerable but that are actually heavily instrumented and monitored systems that will document everything an attacker does while retaining copies of every file and command they use.

27
Q

Honeyfile

A

Honeyfiles are intentionally attractive files that contain unique, detectable data that is left in an area that an attacker is likely to visit if they succeed in their attacks. If the data contained in a honeyfile is detected leaving the network, or is later discovered outside of the network, the organization knows that the system was breached.

28
Q

Honeytoken

A

Honeytokens are data that is intended to be attractive to attackers but which is used specifically to allow security professionals to track data. They may be entries in databases, files directories, or any other data asset that can be specifically identified. IDS, IPS, DLP and other systems are then configured to watch for Honeytokens that should not be sent outside the organization or accessed under normal circumstances because they are not actual organizational data.

29
Q

Out-of-Band Management

A

Out-of-Band Management is a separate means of accessing the administrative interface. Most implementations of Out-of-Band Management use a separate management VLAN or an entirely separate physical network for administration.

30
Q

DNS Filtering

A

DNS Filtering uses a list of prohibited domains, subdomains, and hosts and replaces the correct response with an alternate DNS response, often to an internal website that notes that the access was blocked and what to do about the block.

31
Q

DomainKeys Identified Mail (DKIM)

A

DKIM allows organizations to add content to messages to identify them as being from their domain. DKIM signs both the body of the message and elements of the header, helping to ensure that the message is actually from the organization it claims to be from. It adds a DKIM-Signature header, which can be checked against the public key that is stored in public DNS entries for DKIM-enabled organizations.

32
Q

Sender Policy Framework (SPF)

A

SPF is an email authentication technique that allows organizations to publish a list of their authorized email servers. SPF records are added to the DNS information for your domain, and they specify which systems are allowed to send email from that domain.

33
Q

Domain-based Message Authentication Reporting and Conformance (DMARC)

A

DMARC is a protocol that uses SPF and DKIM to determine whether an email message is authentic. DMARC records are published in DNS, but unlike DKIM and SPF, DMARC can be used to determine whether you should accept a message from a sender.

34
Q

Ephemeral Key

A

Ephemeral Keys are used in TLS. In ephemeral Diffie-Hellman key exchanges, each connection receives a unique, temporary key. That means that even if a key is compromised, communications that occurred in the past, or in the future in a new session, will not be exposed.

35
Q

File Integrity Monitor

A

File Integrity Monitors will detect changes to important files (often configuration files) and either report on them or restore them to normal. File Integrity Monitoring tools like Tripwire create a signature or fingerprint for a file, and then monitor the file and filesystem for changes to monitored files.

36
Q

DNS (Port #)

A

TCP/UDP 53

37
Q

DNSSEC (Port #)

A

TCP/UDP 53 (focuses on ensuring that DNS information is not modified; does not provide confidentiality)

38
Q

Telnet (Port #)

A

TCP 23

39
Q

SSH (Port #) [Secure]

A

TCP 22

40
Q

SNMP (Port #)

A

UDP 161 and 162

41
Q

SNMPv3 (Port #) [Secure]

A

UDP 161 and 162 (only the authPriv level uses encryption, therefore insecure implementations of SNMPv3 are still possible)

42
Q

RTP (Port #)

A

UDP 16384-32767

43
Q

SRTP (Port #) [Secure]

A

UDP 5004

44
Q

POP3 (Port #)

A

TCP 110

45
Q

Secure POP3 (Port #) [Secure]

A

TCP 995

46
Q

FTPS (Port #) [Secure]

A

TCP 21 in explicit mode
TCP 990 in implicit mode

47
Q

SFTP (Port #) [Secure]

A

TCP 22 (uses SSH)

48
Q

IMAP (Port #)

A

TCP 143

49
Q

IMAPS (Port #) [Secure]

A

TCP 993

50
Q

LDAP (Port #)

A

UDP AND TCP 389

51
Q

LDAPS (Port #) [Secure]

A

TCP 636

52
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A

S/MIME provides the ability to encrypt and sign MIME data, the format used for email attachments. S/MIME requires a certificate for users to be able to send and receive S/MIME-protected messages.

53
Q

What are the two most significant components of the IPSec security protocol suite?

A
  1. Authentication Header (AH) uses hashing and a shared secret key to ensure integrity of data and validates senders by authenticating the IP packets that are sent.
  2. Encapsulating Security Payload (ESP) operates in either transport mode or tunnel mode. In tunnel mode, it provides integrity and authentication for the entire packet; in transport mode, it only protects the payload of the packet.
54
Q

SSL Stripping

A

An SSL Stripping attack uses an on-path attack when the HTTP request occurs, redirecting the rest of the communications through a system that an attacker controls, allowing the communication to be read or possibly modified.

55
Q

Domain Hijacking

A

Domain Hijacking changes the registration of a domain, either through technical means like a vulnerability with a domain registrar or control of a system belonging to an authorized user, or through nontechnical means such as social engineering. The end result is the attacker being able to intercept traffic, send and receive email, or otherwise take action while appearing to be the legitimate domain holder.

56
Q

DNS Poisoning

A

DNS Poisoning can be accomplished in multiple ways. One form is another form of the on-path attack where an attacker provides a DNS response while pretending to be an authoritative DNS server. DNS Poisoning can also involve poisoning the DNS cache on systems. Once a malicious DNS entry is in a system’s cache, it will continue to use that information until the cache is purged or updated.

57
Q

Credential Replay

A

Credential Replay attacks are a form of network attack that requires the attacker to be able to capture valid network data and to re-send it or delay it so that the attacker’s own use of the data is successful. A common version of this attack is to intercept and re-send authentication tokens for web services.

58
Q

Volume-Based Network DDoS Attacks

A

Volume-Based Network DDoS Attacks focus on the sheer amount of traffic causing a denial-of-service condition. Some Volume-Based DDoS Attacks rely on amplification techniques that leverage flaws or features in protocols and services to create significantly more traffic than the attacker sends. Some example of Volume-Based DDoS Attacks are UDP floods and ICMP floods.

59
Q

Protocol-Based Network DDoS Attacks

A

Protocol-Based Network DDoS Attacks focus on the underlying protocols used for networking. SYN floods send the first step in a three-way TCP handshake and do not respond to the SYN-ACK that is sent back, thus consuming TCP stack resources until they are exhausted.

60
Q

Amplified DDoS Attacks

A

Amplified DDoS Attacks take advantage of protocols that allow a small query to return large results like a DNS query. Spoofing a system’s IP address as part of a query can result in a DNS server sending much more traffic to the spoofed IP address than was sent to the DNS server originally, amplifying a small amount of traffic into a large response.

61
Q

Reflected DDoS Attacks

A

Reflected DDoS Attacks cause a legitimate service to conduct the attack, making it harder to know who the attacker is.