3.3 Flashcards

(50 cards)

1
Q

What are the functions of Load Balancers

A

-Configurable load
–Manage across servers

-TCP offload
–Protocol overhead

-SSL offload
–Encryption/Decryption

-Caching
–Fast response

-Prioritization
–QoS

-Content Switching
–Application-centric balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the functions of Load Balancers?

A

-Configurable load
–Manage across servers

-TCP offload
–Protocol overhead

-SSL offload
–Encryption/Decryption

-Caching
–Fast response

-Prioritization
–QoS

-Content Switching
–Application-centric balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the scheduling for Load balancers?

A

-Round-robin
–Each server is selected in turn

-Weighted round-robin
–Prioritize the server use

-Dynamic round-robin
–Monitor the server load and distribute to the server with the lowest use

-Active/active load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is affinity (load balancer)?

A

-Affinity
–A kinship, a likeness

-Many applications require communication to the same instance
–Each user is “stuck” to the same server
–Tracked through IP address or session IDs
–Source affinity / sticky session / session persitence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is physical segmentation?

A

-Devices are physically separate
–Air gap between switch A and Switch B

-Must be connected to provide communication
–Direct connect, or another switch or router

-Web servers in one rack
–Database servers on another

-Customer A on one switch, customer B on another
–No opportunity for mixing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are logical segmentations with VLANs?

A

-Virtual Local Area Networks (VLANs)
–Separated logically instead of physically
–Cannot communicate between VLANs without a Layer 3 device / router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Screened Subnet?

A

-Previously known as the demilitarized zone (DMZ)
–An additional layer of security between the internet and you
–Public access to public resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Extrnet?

A

-A private network for partners
–Vendors, suppliers

-Usually requires additional authentication
–Only allow access to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Extrnet?

A

-A private network for partners
–Vendors, suppliers

-Usually requires additional authentication
–Only allow access to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Intranet?

A

-Private netowrk
–Only available internally

-Company announcements, important documents, other company business
–Employees only

-No external access
–Internal or VPN access only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is East-West and North-South traffic?

A

-Traffic flows within a data center
–Important to know where traffic starts and ends

-East-West
–Traffic between devices in the same data center
–Relatively fast response times

-North-south traffic
–Ingress/egress to an outside device
–A different security posture than east-west traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Zero Trust?

A

-Many networks are relatively open on the inside
–Once you’re through the firewall, there are few security controls

-Zero trust is a holistic approach to network security
–Covers every device, every process, every person

-Everything must be verified
–Nothing is trusted
–Multifactor authentication, encryption, system permissions, additional firewalls, monitoring and analytics, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are VPNs?

A

-Virtual Private Networks
–Encrypted (private) data traversing a public network

-Concentrator
–Encryption/decryption access device
–Often integrated into a firewall

-Many deployment options
–Specialized cryptographic hardware
–Software-based options available

-Used with client software
–Sometimes built into the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SSL VPN

A

-Secure Socket Layer Virtual Private Network

-Uses common SSL/TLS protocol (tcp/443)
–Almost No firewall issues!

-No big VPN clients
–Usually remote access communication

-Authenticate users
–No requirement for digital certificates or shared passwords (like IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a HTML5 VPN?

A

-Hypertext Markup Language version 5
–The language commonly used in web browsers

-Includes comprehensive API support
–Application Programming Interface
–We cryptography API

-Create a VPN tunnel without a separate VPN application
– Nothing to install

-Use an HTML5 compliant browser
–Communicate directly to the VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Site-to-SiteVPN?

A

-Always-on
-or almost always

-Firewalls often act as VPN concentrators
–Probably already have firewalls in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is L2TP?

A

-Layer 2 Tunneling Protocol
–Connecting sites over a layer 3 network as if they were connected at layer 2

-Commonly implemented with IPsec
–L2TP for the tunnel, IP sec for the encryption
–L2TP over IPsec (L2TP/IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Authentication Header (AH)?

A

-Hash of the packet and a shared key
–SHA-2 is common
–Adds the AH to the packet header

-This doesn’t provide encryption
–Provides data integrity (hash)
–Guarantees the data origin (authentication)
–Prevents repla attacks (sequence numbers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is ESP?

A

-Encapsulation Security Payload

-Encrypts and authenticates the tunneled data
–Commonly uses SHA-2 for hash, AES for encryption
–Adds a header, a trailer, and an integrity check value

-Combine with Authentication Header (AH) for integrity and authentication of the outer header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Broadcast?

A

-Sends information to everyone at once
–One frame or packet, received by everyone
–Every device must examine the broadcast

-Limited scope
–The broadcast domain

-Routing updates, ARP requests
–Can add up quickly

-Malicious software or a bad NIC
–Not always normal traffic

-Not used in IPv6
–Focus on multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is broadcast storm control?

A

-The switch can control broadcasts
–Limit the number of broadcasts per second

-Can often be used to control multicast and unknown unicast traffic
–Tight security posture

-Manage by specific values or by percentage
–Or the change over normal traffic patterns

22
Q

What is loop protection?

A

-Connect two switches to each other
–They’ll send traffic back and forth forever
–There’s no “counting” mechanism at the MAC layer

-This is an easy way to bring down a network
–And somewhat easy to resolve

-IEEE standard 802.1D to prevent loops in bridged (switch) networks (1990)
–Created by Radia Perlman
–Used practically everywhere

23
Q

What is a BPDU gaurd?

A

-Spanning tree takes time to determine if a switch port should forward frames
–Bypass the listening and learning states
–Cisco calls this PortFast

-BPDU (Bridge Protocol Data Unit)
–The Spanning tree control protocol

-If a BPDU frame is seen on a Portfast configured interface (i.e, a workstation), shut down the interface
–This shouldn’t happen
–Workstations don’t send BPDUs

24
Q

What is DHCP snooping?

A

-IP tracking on a layer 2 device (switch)
–The switch is a DHCP firewall
–Trusted: Routers, switches, DHCP servers
–Untrusted: Other computers, unofficial DHCP servers

-Switch watches for DHCP conversations
–Adds a list of untrusted devices to a table

-Filters invalid IP and DHCP information
–Static IP addresses
–Devices acting as DHCP servers
–Other invalid traffic patterns

25
What is MAC filtering?
-Media Access Control --The "hardware" address -Limit access through the physical hardware address --Keeps the neighbors out --Additional administration with visitors -Easy to find working MAC addresses through wireless LAN analysis --MAC addresses can be spoofed --Free open-source software
26
What is out-of-band management?
-The network isn't available --Or the device isn't accesssible from the network -Most devices have a seperate management interface --Usually a serial connection / USB -Connect a modem --Dial-in to manage the device -Console router / comm server --Out-of-band access for multiple devices --Connect to the console router, then choose where you want to go
27
What is the need for QoS?
-Quality of Service -Many different devices --Desktop, laptop, VoIP phone, mobile devices -Many different applications --Mission critical applications, streaming video, video, streaming audio -Different apps have different network requirements --Voice is real-time --Recorded streaming video has a buffer --Database application is interactive -Some applications are "more important" than others --Voice traffic needs to have priority over YouTube --Prioritize traffic performance --Voice over IP traffic has priority over web-browsing --Prioritize by maximum bandwidth, traffic rate, VLAN, etc. -Quality of service --Describes the process of controlling traffic flows -Many different methods --Across many different topologies
28
What's different about IPv6 regarding security?
-More IP address space --More difficult to IP/port scan (but not impossible) --The tools already support IPv6 -No need for NAT --NAT is not a security feature -Some attacks disappear --No ARP, so no ARP spoofing -New attacks will appear --For example, Neighbor Cache Exhaustion
29
What are Taps and Port mirrors?
-Intercept network traffioc --Send a copy to a packet capture device -Physical Taps --Disconnect the link, put a tap in the middle --Can be an active or passive tap -Port Mirror --Port Redirection, SPAN (Switched Port ANalyzer) --Software-based tap --Limited functionality, but can work well in a pinch
30
What is FIM?
-File Integrity Monitoring -Some files change all the time --Some files should NEVER change -Monitor important operating system and application files --Identify when changes occur -Windows - SFC (System file Checker) -Linux - Tripwire -Many host-based IPS options
31
Explain Network-based Firewalls
-Filter traffic by port number or application --Traditional vs. NGFW firewalls -Encrypt traffic --VPN between sites -Most firewalls can be layer 3 devices (routers) --Often sits on the ingress/egress of the network --Network Address Translation (NAT) functionality --Authenticate dynamic routing communication
32
What is a stateless firewall?
-Does not keep track of traffic flows --Each packet is individually examined, regardless of past history --Traffic sent outside of an active session will traverse a stateless firewall -- one that doesn't store information about the current state of a network connection.
33
What is a stateful firewall?
-Stateful firewalls remember the "state" of the sessions --Everything within a valid flow is allowed --a kind of firewall that keeps track and monitors the state of active network connections while analyzing incoming traffic and looking for potential traffic and data risks.
34
What is a UTM?
-Unified Threat Management (UTM ) / Web security gaeway -All in one security appliance --URL filter / Content Inspection --Malware Inspection --Spam filter --CSU/DSU --Router, Switch --Firewall --IDS/IPS --Bandwidth shaper --VPN endpoint
35
What is WAF?
-Web Application Firewall -Not like a "normal" firewall --Applies rules to HTTP/HTTPS conversations -Allow or deny based on expected input --Unexpected input is a common method of exploiting an application -SQL injection --Add your own commands to an application's SQL query -A major focus of Payment Card Industry Data Security Standard (PCI DSS)
36
Explain Firewall Characteristics
-Open-Source vs. Proprietary --Open-source provides traditional firewall functionality --Proprietary features include application control and high-speed hardware -Hardware vs. software --Purpose-built hardware provides efficient and flexible connectivity options --Software-based firewalls can be installed almost anywhere -Appliance vs. host-based vs virtual --Appliances provide the fastest throughput --Host-based firewalls are application-aware and can view non-encrypted data --Virtual firewalls provide valuable East/West network security
37
Explain Edge vs. Access control
-Control at the edge --Your internet link --Managed primarily through firewall rules --Firewall rules rarely change -Access Control --Control from wherever you are ==inside or outside --Access can be based on man rules ==By user, group, location, application, etc. --Access can be easily revoked or changed ==Change your security posture at any time
38
Explain the different Agents
-Persistent agents --Permanently installed onto a system --Periodic updates may be required -Dissolvable agents --No installation is required --Runs during the posture assessment --Terminates when no longer required -Agentless NAC --Integrated with Active Directory --Checks are made during login and logoff --Can't be scheduled
39
What is a Proxy?
-Sits between the users and the external network -Receives the users requests and sends the request on their behalf (the proxy) -Useful for caching information, access control, URL filtering, content scanning -Applications may need to know how to use the proxy (explicit) -Some proxies are invisible (transparent)
40
What is a Application Proxy?
- One of the simplest "proxies" is NAT --A network-level proxy -Most proxies in use are application proxies --The proxy understands the way the application works -A proxy ay only know one application --HTTP -Many proxies are multipurpose proxies --HTTP, HTTPS, FTP, etc.
41
What is a Forward Proxy?
-An "Internal Proxy" --Commonly used to protect and control user access to the internet
42
What is a Reverse Proxy?
-Inbound traffic from the internet to your internal service
43
What is a Open Proxy?
-A third-party, uncontrolled proxy --Can be a significant security concern -Often used to circumvent existing security controls
44
What is Passive monitoring?
-Examine a copy of the traffic --Port mirrir (SPAN), network tap - No way to block (prevent) traffic
45
What is out-of-band response?
-When malicious traffic is identified, IPS sends TCP RST (reset) frames --After-the-fact --Limited UDP response available
46
What is Inline monitoring?
-IDS/IPS sits physically inline --All traffic passes through the IDS/IPS
47
What is In-band response?
-Malicious traffic is immediately identified --Dropped at the IPS --Does not proceed through the network
48
List the Identification Technologies
-Signature-based --Look for a perfect match -Anomaly-based --Build a baseline of what's "normal" -Behavior-based --Observe and report -Heuristics --Use artificial intelligence to identify
49
What is a Jump Server?
-Access secure network zones --Provides an access mechanism to a protected network -Highly-secured device --Hardened and monitored -SSH / Tunnel / VPN to the jump from there -A significant security concern --Compromise to the jump server is a significant breach
50
What is the HSM?
-Hardware Security Module -Used in large environments --Clusters, redundant power -High-end cryptographic hardware --Plug-in card or separate hardware device -Key backup --Secured storage -Cryptographic accelerators --Offload that CPU overhead from other devices