4.5 Flashcards

1
Q

Types of firewalls

A

Web App
unified threat management
next generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port

A

logical communication endpoints on a computer or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inbound port

A

listens for connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

outbound port

A

used to connect to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port classification

A

Well known (0-1023)
registered (1024-49151)
dynamic and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocols

A

rules governing device communication and data exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

screened subnet

A

aka dual homed host
its a dmz and its a logical separated network area between internal network and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of firewalls

A

packet filtering
proxy
stateful
kernel proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

packet filtering firewall

A

fastest because its only checking packet acts similar to a router
cannot prevent ip spoofing due to limited insepction
operates at layer 4 (transport layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stateful firewall

A

tracks connections and requests allowing return traffic for outbound requests
operates at layer 4 (transport layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proxy firewall

A

makes connections on behalf of endpoints enhancing security
- very secure
- acts as an intermidiary
- operaties on app layer or session layer - 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

kernel proxy

A

full packet inspection at every layer
minimal impact on network performance
placed close to every system thy protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NGFW

A

next generation firewall
- application aware (distinguishes different types of traffic)
-conducts deep packet analysis
-operates fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UTM

A

unified threat management firewall
-combines multiple securty functions in a single device
- functions can include firewall, intrusion prevention, antivirus, and more
-single point of failure protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAF

A

web app firewall
–http traffic
-prevents SQL injections etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In line WAF

A

live attack prevention
device sits between the network firewall and the web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Out of band WAF

A

device receives a mirrored copy of web server traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ACL

A

access control list
- essential for securing networks from unwanted traffic
consist of permit and deny statements often based on port numbers
the
place most specific rules at the top and generic at the bottom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ACL key pieces of information

A

type of traffic
source of traffic
destination of traffic
action to take against traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware based firewall

A

a dedicated network security device that filers and controls network traffic at the hardware level
commonly used to protect an entire network or subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Software firewall

A

a firewall that runs as a software app on inidividual devices

22
Q

NAC

A

network access control
-used to protect networks from both known and unknown devices by scanning devices to assess their security status before granting network access
-can be a applied as a hardware or a software solution

23
Q

Persistent Agents

A

installed on devices in a corporate environment where the org conrtrols and owns the device software

24
Q

non-persistent agents

A

common in environments with personal devices where users connect to a web based app and download an agent for scanning. It deletes itself after inspection

25
802.1x standard
port based network access control mechanism based on IEEE 802.1x standard modern NAC solutions build on this
26
Rule based Access Control
NAC can use rule based methods like -time based factors -location based -role based -rule based (implement complex admission policies with logicial statements)
27
WEb filtering
Web filtering or content filtering is used to control or restrict the content users can access on the internet ■ Crucial for businesses, educational institutions, and parents to ensure safe and productive internet use
28
Types of web filtering
agent based centralized proxy URL scanning content categorization block rules reputation based filtering
29
Agent based web filtering
involves installing an agent on each device monitors and enforces web usage policies effective for remote and mobile workers
30
Centralized proxy
uses a proxy server as an intermediary between an organization’s end users and the Internet ● Evaluates and controls web requests based on policies ● If the request does not conform with the policies, the request is simply blocked or denied
31
URL scanning
Analyzes website URLs to check for matches in a database of known malicious websites
32
Content Categorization
Classifies websites into categories (e.g., social media, adult content) and blocks or allows categories based on policies
33
Block rules
Specific guidelines set by organizations to prevent access to certain websites or categories, often used to address security threats
34
Reputation based filtering
Blocks or allows websites based on a reputation score determined by third-party services, considering factors like hosting malware or phish
35
DNS filtering
DNS filtering (Domain Name System filtering) blocks access to specific websites by preventing the translation of domain names to their IP addresses -Users' devices request domain name translation from DNS servers; if the domain is on the block list, the server withholds the IP address to prevent access ■ Commonly used to enforce internet usage policies, block inappropriate content, and protect against malicious websites ■ Often employed by schools, universities, and organizations to ensure safe and educational internet usage
36
DKIM
domainkeys identified mail -Allows the receiver to verify the source and integrity of an email by adding a digital signature to the email headers ● The recipient server validates the DKIM signature using the sender's public cryptographic key in the domain's DNS records ● Benefits ○ Email authentication ○ Protection against email spoofing ○ Improved email deliverability ○ Enhanced reputation score
37
SPF
sender policy framework Prevents sender address forgery by verifying the sender's IP against authorized IPs listed in the sender's domain DNS records ● A receiving server checks if the sender's IP is authorized in the SPF recor
38
DMARC
domain based message authentication reporting and conformance DMARC detects and prevents email spoofing by setting policies for email sending and handling failures ● DMARC can work with DKIM, SPF, or both ● Implementation helps protect against ○ Business email compromise attacks ○ Phishing ○ Scams ○ Cyber threats
39
Email gateway protocol configuration
Email gateways serve as entry and exit points for emails, facilitating secure and efficient email transmission ● They use SMTP (Simple Mail Transfer Protocol) to send and receive emails ● Email gateways handle email routing, email security, policy enforcement, and email encryption
40
Email gateway deployment options
on premiscloud based hybrid
41
spam filtering
Spam filtering detects and prevents unwanted and unsolicited emails from reaching users' inboxes ■ Techniques ● Content analysis ● Bayesian filtering ● DNS-based sinkhole list ● Email filtering rules
42
EDR
end point detection and response Category of security tools that monitor endpoint and network events and record the information in a central databas
43
how endpoint detection works
Data Collection ● Collects data from endpoints (devices that are physically on the endpoint of a network) ○ System processes ○ Registry changes ○ Memory usage ○ Network traffic patterns ■ Data Consolidation ● Sends collected data to a centralized security solution or database ■ Threat Detection ● Analyzes data using techniques like signature-based and behavioral-based detection to identify threats ■ Alerts and Threat Response ● Takes actions such as creating alerts or performing threat response actions when threats are detected ■ Threat Investigation ● Provides tools for security teams to investigate threats, including detailed timelines and forensic data ■ Remediation ● Removing malicious files ● Reversing changes ● Restoring systems to their normal state
44
FIM
file integrity monitoring Validates the integrity of operating system and application software files by comparing their current state with a known, good baseline ■ Identifies changes to ● Binary files ● System and Application Files ● Configuration and Parameter Files ■ Monitors critical system files for changes using agents and hash digests, triggering alerts when unauthorized changes occur
45
XDR
extended detection and response ecurity strategy that integrates multiple protection technologies into a single platform ■ Improves detection accuracy and simplified incident response ■ Correlates data across multiple security layers to detect threats faster, including ● email ● endpoint ● server ● cloud workloads ● network ○ Difference between EDR and XDR ■ EDR is focused on the endpoints to detect and respond to potential threats ■ XDR is more comprehensive solution because it focuses on endpoints, but also on networks, cloud, and email to detect and respond to potential threats ● It integrates multiple protection technologies
46
UBA
user behavior analytics advanced security strategy that uses big data and machine learning to analyze behaviors for detecting security threats
47
UEBA
User and Entity Behavior Analytics (UEBA) ■ Technology similar to UBA but extends the monitoring of entities like routers, servers, and endpoints in addition to user accounts
48
Secure protocols
Choose secure protocols to protect data in transit from unauthorized access ● Examples include HTTP vs. HTTPS, FTP vs. SFTP, Telnet vs. SSH
49
Telnet
app layer protocol that allows one computer to log onto another computer that is part of the same network transmits in plaintext use ssh instead of
50
TCP
TCP (Transmission Control Protocol) ● Connection-oriented, ensuring data delivery without errors ● Ideal for applications where data accuracy is crucial, like web and email servers ● Uses acknowledgments, retransmission, and sequencing for data integrity
51
UDP
Connectionless and faster, but doesn't guarantee data delivery ● Suitable for applications prioritizing speed over accuracy, like streaming video or gaming