Flashcards in Chapter 3 - Understanding Devices and infrastructure Deck (25):
What consists of TCP 3-way handshake
SYN > SYN/ACK > ACK
What is APIs?
Application Programming Interfaces
Allows programmers to create interfaces to the protocol suite
What ports does iSCSI use?
Internet Small Computer Systems Interface
Uses ports 860 and 3260 by default for allowing data storage and transfers across the existing network
When designing a security topology, what are the 7 common element s to consider?
* Remote Access
What are the two reasons subnetting is implemented?
* To use IP address more effectively'
* To make the network more secure and manageable.
What tunneling protocol supports encapsulation in a single point-to-point environment.
Point-to-Point Tunneling Protocol (PPTP)
Uses port 1723
Which Tunneling protocol is a hybrid of PPTP and L2F?
Layer 2 Tunneling Protocol (L2TP)
It's primarily a Point-to-Point protocol and supports multiple network protocols and can be used in networks besides TCP/IP.
What is IPSec?
Is not a tunneling protocol, but it is used in conjunction with tunneling protocols. IPSec provides secure authentication and encryption of data and headers; this makes a good choice for security.
What acts as proxy between the local area network, and creates a unique opportunity to assist in the security of a network.
Network Address Translation (NAT)
What are the private address ranges?
10.0.0.0. to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
What does Packet Filter Firewalls Do?
Passes or blocks traffic to specific addresses based on the type of application.
Don't analyze the data of a packet: it decides whether to pass it based on the packet's addressing information
How many NICs does a proxy firewall typically use?
two, referred to as a dual-home firewall
Anytime you have a system that is configured with more than one IP address, it can be said to be ____?
What type of proxy function reads the individual commands of the protocols that are being served
What type of proxy function creates a circuit between the client and the server and doesn't deal with the contents of the packets that are being processed?
What splits the traffic intended for a website into individual requests that are then rotated to redundant servers as they become available and shift a load from one device to another?
What are IDS and how can they be utilized?
A software that runs either on individual workstations or on network devices to monitor and track network activity.
Can be configured to act as a burglar alarm
What are several key terms associated with IDS?
Data Source Event
What are IDS four primary approaches?
What attaches itself to the system to a point in the network where it can monitor and report on all traffic, can be in front of or behind the firewall.
Network-Based IDS (NIDS)
What is the most common type of response to many intrusions and in general the easiest to develop and implement?
What are three types of passive response strategies?
What are three types of active response strategies?
Terminating Processes or Sessions
Network Configuration Changes
What are HIDS?
Are designed to run as software on a host computer system