3.3 Secure Network Design Flashcards

(52 cards)

1
Q

Load balancing

A

Spreads network loads across a set of resources.

Used for websites, high bandwidth files, IRC (Internet Relay Chat)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active/Active

A

Two servers working together to distribute the load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active/Passive

A

One server active and the second server or more is just observing ready to take over if the primary server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scheduling

A

A algorithm decides which machine receives the load.

Types of scheduling:
Affinity-based & Round-Robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Affinity-Based Scheduling

A

Keeps the host connected to the same server for the entire session.
Directs all load balancing back to the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Round-Robin Scheduling

A

Sends request to a new server each time, dose not matter how big the request is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual IP

A

Server creates virtual IPs to give to the end users so the request data from that server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Persistence

A

Uses Affinity Scheduling, connects to the same target(server) in a load balancing system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Segmentation

A

Separates servers or network devices off the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VLAN

A

Virtual Local Area Network

A LAN set of devices that are connected to a switch.
A VLAN is the same thing but is ran by software.
A trunk is used to send packets to other VLAN for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Screened Subnet

A

Buffer zone between Untrusted network (Internet) and Trusted Network. Accomplished by placing Hardening devices between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

East-West Traffic

A

Data that flows through a enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

North-South Traffic

A

Data that flows outside the the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extranet

A

It is semi private network that allows users to request information from the Internet but masks the IP address by using a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intranet

A

Private Network that only allows downloaded data to be shared across its network.

It can get information from the internet by using a proxy server and a cache server to slow down request for that same thing.

Proxy sever also stop inappropriate content from being shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero Trust

A

Security Model that doesn’t allow you to trust anyone without validating ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VPN

A

Virtual Private Network
Protocols that allow packets to be sent across a unsecured network.
VPNs work because only the endpoints can decrypt the message.
Protocols: SSH, IPSec, L2TP, SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Always On

A

When a VPN senses a internet connection its auto-mantically turns on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Split tunnel vs. full tunnel

A

Splitting Traffic from a VPN. Increases speed but some packets are insecure.

Full gives full protection over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Site-to-Site

A

Encrypting traffic when connecting to a intermediary (public Internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Remote

A

Allows connection to a specific network.

22
Q

IPSec

A

Protocol on how packets are sent two ways.

Transport mode encrypts the data being sent.

Tunnel Mode encrypts the destination.

Security Association combines both.

23
Q

SSL/TLS

A

Transport Layer across the Web

24
Q

HTML5

A

Current version of HTML. Used to develop web page content.
Newer version can connects to a VPN and can connect to more devices such as mobile.

25
L2TP
Layer 2 Tunnel Protocol
26
DNS
DNSSEC is a DNS protocol that validates the DNS.
27
NAC
Network Access Control A methodology that manages end-point devices. Used to control who connects to the network.
28
NAC Agent
NAC is installed on the host device itself
29
NAC Agentless
NAC Agentless code that is stored within the memory.
30
Out-of-Band Management
In-band Managements- a system that is directly connected to the physical data flow. Out-band Management - a system that is separate from the neatwork itself in case a physical connection is not available.
31
Port Security
controls the devices that is connected to your switch through MAC.
32
Port Security types
Static Learning- Assigned Device connects to a switch MAC is stored. Dynamic Learning- MAC is stored as they connect. Sticky Learning- Multiple MACs are connected to a single port switch.
33
Flood Guards
Monitors Traffic and drops connection when there is too much traffic
34
BPDU
Bridge Protocol Data Unit Blocks BPDU packets to stop a DOS Attack.
35
Loop Prevention
36
DHCP Snooping
Prevents malicious DHCP servers from connecting to good DHCP servers on the switch level.
37
MAC filtering
allows you to block traffic coming from certain known machines or devices
38
Jump Servers
Connect to a jump host before connecting a protected network. Basically using a middle man connection to connect to the important stuff
39
Proxy Servers
Servers that stop users from accessing bad websites
40
Types of Proxy Server
Forward proxy- protects the client Reverse- Protects the server.
41
NIDS
Network Intrusion Detection System Detects and logs unauthorized network activity.
42
NIPS
Network Intrusion Prevention System Same as NIDS but takes action.
43
NIPS (IDS way of identifying)
Signature-based- pre downloaded signatures that the IDS looks for. Heuristic/Behavior- Uses AI or pre assigned rules t identify IDS. Anomaly- deviation from any normal behavior.
44
NIPS/NIDS In-Band/Out-band Passive
In-Band- a sensor that looks for malicious traffic on a network. Out-band- Looks for things on wider spectrum.
45
HSM
Hardware Security Module- a DEVICE that allows you to store encryption keys. Used to keep passwords off a network
46
ACL
Access Control List- List of host that can make configurations to the network
47
Routing Security
Protocols that set in place so that packets are secure and enable network functionality
48
Q&S
Quality of Service- Technologies used for to manga a networks bandwidth, latency, jitter, and error rates. Admin can allocate what packets are a priority through this.
49
Port Mirror/SPAN
Switch port Analyzer- ability to copy one or more ports
50
Port Traps/TAPS
Test Access Point- hardware within a network that can copy all the packets that been sent through. \ Not good because that can be used in a Man-in-the-middle-attack.
51
Monitoring Services/NSM
Network Security Monitoring- A SERVICE that analyze network activity and alerting if network defenses have failed.
52