3.3 Secure Network Design Flashcards

1
Q

Load balancing

A

Spreads network loads across a set of resources.

Used for websites, high bandwidth files, IRC (Internet Relay Chat)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active/Active

A

Two servers working together to distribute the load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active/Passive

A

One server active and the second server or more is just observing ready to take over if the primary server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scheduling

A

A algorithm decides which machine receives the load.

Types of scheduling:
Affinity-based & Round-Robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Affinity-Based Scheduling

A

Keeps the host connected to the same server for the entire session.
Directs all load balancing back to the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Round-Robin Scheduling

A

Sends request to a new server each time, dose not matter how big the request is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual IP

A

Server creates virtual IPs to give to the end users so the request data from that server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Persistence

A

Uses Affinity Scheduling, connects to the same target(server) in a load balancing system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Segmentation

A

Separates servers or network devices off the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VLAN

A

Virtual Local Area Network

A LAN set of devices that are connected to a switch.
A VLAN is the same thing but is ran by software.
A trunk is used to send packets to other VLAN for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Screened Subnet

A

Buffer zone between Untrusted network (Internet) and Trusted Network. Accomplished by placing Hardening devices between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

East-West Traffic

A

Data that flows through a enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

North-South Traffic

A

Data that flows outside the the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extranet

A

It is semi private network that allows users to request information from the Internet but masks the IP address by using a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intranet

A

Private Network that only allows downloaded data to be shared across its network.

It can get information from the internet by using a proxy server and a cache server to slow down request for that same thing.

Proxy sever also stop inappropriate content from being shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero Trust

A

Security Model that doesn’t allow you to trust anyone without validating ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VPN

A

Virtual Private Network
Protocols that allow packets to be sent across a unsecured network.
VPNs work because only the endpoints can decrypt the message.
Protocols: SSH, IPSec, L2TP, SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Always On

A

When a VPN senses a internet connection its auto-mantically turns on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Split tunnel vs. full tunnel

A

Splitting Traffic from a VPN. Increases speed but some packets are insecure.

Full gives full protection over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Site-to-Site

A

Encrypting traffic when connecting to a intermediary (public Internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Remote

A

Allows connection to a specific network.

22
Q

IPSec

A

Protocol on how packets are sent two ways.

Transport mode encrypts the data being sent.

Tunnel Mode encrypts the destination.

Security Association combines both.

23
Q

SSL/TLS

A

Transport Layer across the Web

24
Q

HTML5

A

Current version of HTML. Used to develop web page content.
Newer version can connects to a VPN and can connect to more devices such as mobile.

25
Q

L2TP

A

Layer 2 Tunnel Protocol

26
Q

DNS

A

DNSSEC is a DNS protocol that validates the DNS.

27
Q

NAC

A

Network Access Control
A methodology that manages end-point devices.
Used to control who connects to the network.

28
Q

NAC Agent

A

NAC is installed on the host device itself

29
Q

NAC Agentless

A

NAC Agentless code that is stored within the memory.

30
Q

Out-of-Band Management

A

In-band Managements- a system that is directly connected to the physical data flow.

Out-band Management - a system that is separate from the neatwork itself in case a physical connection is not available.

31
Q

Port Security

A

controls the devices that is connected to your switch through MAC.

32
Q

Port Security types

A

Static Learning- Assigned Device connects to a switch MAC is stored.

Dynamic Learning- MAC is stored as they connect.

Sticky Learning- Multiple MACs are connected to a single port switch.

33
Q

Flood Guards

A

Monitors Traffic and drops connection when there is too much traffic

34
Q

BPDU

A

Bridge Protocol Data Unit

Blocks BPDU packets to stop a DOS Attack.

35
Q

Loop Prevention

A
36
Q

DHCP Snooping

A

Prevents malicious DHCP servers from connecting to good DHCP servers on the switch level.

37
Q

MAC filtering

A

allows you to block traffic coming from certain known machines or devices

38
Q

Jump Servers

A

Connect to a jump host before connecting a protected network.

Basically using a middle man connection to connect to the important stuff

39
Q

Proxy Servers

A

Servers that stop users from accessing bad websites

40
Q

Types of Proxy Server

A

Forward proxy- protects the client

Reverse- Protects the server.

41
Q

NIDS

A

Network Intrusion Detection System

Detects and logs unauthorized network activity.

42
Q

NIPS

A

Network Intrusion Prevention System

Same as NIDS but takes action.

43
Q

NIPS (IDS way of identifying)

A

Signature-based- pre downloaded signatures that the IDS looks for.

Heuristic/Behavior- Uses AI or pre assigned rules t identify IDS.

Anomaly- deviation from any normal behavior.

44
Q

NIPS/NIDS In-Band/Out-band Passive

A

In-Band- a sensor that looks for malicious traffic on a network.

Out-band- Looks for things on wider spectrum.

45
Q

HSM

A

Hardware Security Module- a DEVICE that allows you to store encryption keys.

Used to keep passwords off a network

46
Q

ACL

A

Access Control List-

List of host that can make configurations to the network

47
Q

Routing Security

A

Protocols that set in place so that packets are secure and enable network functionality

48
Q

Q&S

A

Quality of Service-
Technologies used for to manga a networks bandwidth, latency, jitter, and error rates.

Admin can allocate what packets are a priority through this.

49
Q

Port Mirror/SPAN

A

Switch port Analyzer- ability to copy one or more ports

50
Q

Port Traps/TAPS

A

Test Access Point- hardware within a network that can copy all the packets that been sent through. \

Not good because that can be used in a Man-in-the-middle-attack.

51
Q

Monitoring Services/NSM

A

Network Security Monitoring- A SERVICE that analyze network activity and alerting if network defenses have failed.

52
Q
A