2.1 Network Security Flashcards

Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements

1
Q

UTM

A

-Unified Threat Management

incorporates the functions of multiple network and security appliances into a single appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDS/IPS

A

-Intrusion Detection System/Intrusion Protection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIDS/NIPS

A
  • Network Intrusion Detection System/ Network Intrusion Prevention System
  • identifies/prevents intrusion attempts by examining network traffic, potentially looking at both the header and contents of packets being transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

INE

A
  • Inline Network Encryptor
    • Devices that encrypt sensitive information en route between sources and destinations across insecure networks like the internet and company WAN links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NAC

A
  • Network Access Control
  • Improves network security by employing policies that mandate devices meet certain security minimums before granting network access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SIEM

A
  • Security Information and Event Management

- Utilities analyze and correlate logs and events from mulitple sources as well as provide real-time alerting features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch

A

-network appliances that connect devices and workstations, servers, and printers together to form a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

-Network firewalls are devices that evaluate incoming and outgoing traffic to determine if the traffic should be allowed or denied entry across a network boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Controller

A
  • Network appliances or software solutions that enable administrators to centralize security configurations across multiple WAPs simultaneously
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Router

A
  • Devices that connect networks to networks in order to forward traffic based on network addresses such as IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proxy Servers

A

-Hardware or software systems that act as connection intermediaries between internal clients and Internet resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Load Balancers

A

-Devices or programs that distribute traffic across a group of similar servers known as server farm or pol, in order to increase performance and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HSM

A
  • Hardware Security Modules
  • Devices that provide key generation and safeguarding services, speed up specific cryptographic operations on platforms requiring strong authentication, and provide access control capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MicroSD HSM

A

-Tiny HSM cards that plug into the microSD ports of smart devices such as android smart phones and tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAF

A
  • Web Application Firewalls
  • Specialize in the monitoring and filtering of unautherized and malicious traffic sent to and from web applications to provide them with protection against various internet threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passive Vulnerability Scanners

A

analyze network traffic in order to non-intrusively discover vulnerabilities with organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DAM

A
  • Database activity monitors

- monitor the transations and other activity of database services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VPN

A
  • Virtual private network
  • Offers security by tunneling data across a network through the use of technology that offers a secure means of transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPSec

A
  • Internet Port Security

- Suite of protocols for securing packets that traverse an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSL/TLS

A
  • Secure Sockets Layer is a protocol for securing communication sessions over IP networks
  • Transport Layer Security more powerful and relevant successor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SSH

A
  • Secure Shell
  • Protocol for obtaining a remote shell session with an operating system over a secured channel
  • TCP Port 22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RDP

A
  • Remote Desktop Protocol

- provides a secure, graphical, remote access connection over a network between computers using TCP port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VNC

A
  • Virtual Network Computing

- platform-independent graphical desktop sharing protocol that uses the Remote Frame Buffer (RFB) protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VDI

A
  • Virtual Desktop Infrastructure

- Involves the hosting of a desktop OS within a virtual network environment on a centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Reverse Proxy

A

-Servers that provide internet devices with access to servers behind an enterprise firewall

26
Q

802.1x

A

port-based network access control method that requires uers to authenticate prior to connecting to a wired or wireless network

27
Q

Mesh Networks

A

-Involve all devices being directly connected to all other network devices in order to increase path redundancy and availability of the network

28
Q

DLP

A
  • Data Loss Prevention

- Monitors, detects, and prevents the logs of sensitive data.

29
Q

Deep Packet Inspection

A
  • Occurs when application-level and next-generation firewalls scan and analyze the header, state, and data portions of packets before allowing or dropping them
30
Q

Data Flow Enforcement

A

-Refers to the secured and controlled flow of data within a device, between devices within a network, and across other networks.

31
Q

Network Flow

A

-A sequence of packets transferred from a sending host to one or more recieving hosts.

32
Q

S/Flow

A

-Method for monitoring traffic in switched and routed networks

33
Q

Data Flow Diagrams

A

-graphically represent the data flow that occurs between computer systems on a network

34
Q

Configuration Baselining

A

-Allows us to document what normal and acceptable levels or performance are

35
Q

Configuration Lockdown

A

-Seals the configuration into our network devices to prevent unauthorized changes

36
Q

Change monitoring

A
  • Checks for signs of failed/successful attempts at modifying our network configuration baselines
37
Q

Software defined networking

A

Centralizes the configuration and control of network devices

38
Q

Alert Fatigue

A

-Occurs when administrators stop paying attention to alerts due to too many false positives

39
Q

Transport Security

A

-TLS and SSL provide confidentiality and integrity for application layer protocols such as HTTP, SNMP, and SIP

40
Q

Trunking security

A
  • Helps mitigate various switch attacks, including switch spoofing and double-tagging attacks
41
Q

Port Security

A

-Provides assurances that only approved devices are permitted to communicate on its ports

42
Q

Route Protection

A

-Ensures routing table contents, transmissions, and router configurations are protected from unauthorized access and modifications

43
Q

DDoS Protection

A

-Botnet attacks system that renders its services unusable

44
Q

Remotely Triggered Black Hole

A
  • RTBH

- Drops traffic before it gets to its destination

45
Q

DMZ

A

-Perimeter networks that simultaneously protect the internal network while providing secured access to edge resources

46
Q

Separation of Critical Assets

A

-Provides strongest level of isolation to the most critical assets

47
Q

Network Segmentation

A

-Creates layers of security between the organization’s critical or sensitive assets and the outside environment from which attacks can be launched

48
Q

Quarantine/Remediation

A

-clients that are not compliant with network access control policies are quarantined into a restricted network where they seek remediation for their deficiencies

49
Q

Persistent agent

A

-Resides on the client after connections are severed

50
Q

Agent Software

A

-Runs on NAC clients in order to perform authentication and compliance checking prior to connecting to an organization

51
Q

Non-persistent Agent

A

disappear from a client after a connection is ended

52
Q

Agent vs Agentless

A
  • Agents are commonly used on trusted devices that reside within or external networks
  • Agentless clients are common for devices that are not owned by the organization
53
Q

SoC

A
  • System on a chip

- Electronic devices that combine the functions of CPUs, memory, and other hardware onto a single circuit board

54
Q

Building/home automation equipment

A

Centralized management systems that manage and monitor facilities and environmental technologies

55
Q

IP Video

A

IP-based cameras provide video surveillance of critical areas and systems

56
Q

HVAC controllers

A

Centrally controls the heating and cooling temperatures for the enterprise

57
Q

Sensors

A

-Allows technologies to understand environmental measurements and when changes occur

58
Q

Physical Access control systems

A

Controls access to areas using

  • Proximity readers
  • Biormetric readers
  • Mantraps
59
Q

A/V systems

A

Audio/Video systems connected to the network pose security vulnerabilities

60
Q

Scientific/Industrial Equipment

A

Devices connected to the network that pose security vulnerabilities

61
Q

SCADA

A
  • Supervisory Control and Data Acquisition

- Industrial control system