3.3 Implement Secure Network Designs Flashcards

1
Q

Previously known as the DMZ, and allows public access to resources without access to internal network.

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A private network for partners like vendors and suppliers

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Holistic approach to network security that involves ensuring all devices, processes, and people are verified/nothing is trusted.

A

Zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN that uses TLS protocols and doesn’t require a VPN client. Usually ran from a browser.

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN that provides on-demand access. Software connects to a VPN concentrator via a tunnel.

A

Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN type: traffic is encrypted through local concentrator and decrypted on the concentrator on the other side of the tunnel. Generally from firewall/concentrator to firewall/concentrator.

A

Site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN type: Remote user connects to a VPN concentrator and all traffic must pass through the concentrator before being sent out to 3rd party sites.

A

Full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when a load balancer provides a preference connection to a specific server based off of a session ID?

A

Affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What major support is provided by HTML5 that allows use of SSL VPNs without installing a client?

A

API support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPN type: Administrator can determine which traffic is allowed through the tunnel and what traffic can be transmitted over the public internet.

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocol used to connect sites over IP as if they were connected over layer 2. Commonly implemented with IPSec

A

Layer 2 tunneling protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two main security features does IPSec provide?

A

encryption

packet signing (anti-replay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two main IPSec protocols?

A

Authentication Header (AH)

Encapsulation Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What portion of a packet remains in the clear when sending IP packets via transport mode?

A

IP Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: When sending IP packets via tunnel mode, the IP Header is not encrypted.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authentication header does not provide encryption, but rather what aspect of the data? (By using a hash and shared key)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false: ESP provides authentication as well as encryption of IP packets?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What device can be used to control broadcast messages to prevent broadcast storms?

A

Switches

19
Q

What standard was developed to prevent loops?

A

Spanning tree protocol (802.1D)

20
Q

Process of a switch adding untrusted DHCP devices to a untrusted list.

A

DHCP Snooping

21
Q

Adds ability to authenticate responses when it comes to domain requests.

A

DNSSec

22
Q

What is it called when a DNS server redirects a user to a safe location when they are attempting to access a known malicious address?

A

DNS sinkhole

23
Q

What is a console router or comm server?

A

A centralized router that can connect you to all other network devices on the network

24
Q

What unique challenge is faced when it comes to security with IPv6?

A

difficult to IP/port scan

25
Q

A physical device that can be placed in the middle of a network transmission in order to capture traffic transmitted between the two devices.

A

Tap

Port mirror (software based)

26
Q

A location staffed with cybersecurity experts who are constantly monitoring for security risks and vulnerabilities.

A

Security operations Center (SoC)

27
Q

Monitoring that verifies files and alerts you when changes are made.

A

File integrity monitoring (FIM)

28
Q

Firewall that does not keep track of traffic flows.

A

Stateless firewall

29
Q

A device that includes a firewall along with many other features such as URL filtering, malware inspection, spam filters, routing, IDS/IPS, etc.

A

unified threat management (UTM) device

30
Q

A firewall that can evaluate all traffic at all layers of the OSI model.

A

Next generation firewall (NGFW)

31
Q

A firewall build specifically for applications using HTTP/HTTPS traffic.

A

Web application firewall (WAF)

32
Q

Used on many high-end websites, and are a requirement for websites that take credit card payment info through PCI DSS compliance.

A

WAF (web application firewall)

33
Q

How does edge control and access control vary?

A

Access control involves control from anywhere on the network, not just on the edge

34
Q

An assessment performed when a device is brought onto a network via BYOD policies.

A

Posture assessment

35
Q

Device that sits between users and the rest of the network.

A

Proxy server

36
Q

Type of proxy used to control internal access to the internet.

A

Forward proxy

37
Q

A proxy used to direct external traffic towards internal resources.

A

Reverse proxy

38
Q

IPS monitoring that logs and analyzes traffic, but cannot block malicious traffic.

A

Passive monitoring

39
Q

IPS monitoring that captures and analyzes packets before the traffic is able to reach the endpoint.

A

Inline monitoring

40
Q

What are the main ways for an IPS to identify malicious traffic?

A

Signature

Anomaly

Behavior

Heuristics (AI and big data)

41
Q

A server that allows you to make connections to various internal devices from the outside via a secure tunnel.

A

Jump server

42
Q

Device used to control your crypto keys and manages cryptography across entire organization.

A

Hardware security module (HSM)

43
Q
A