Chapter 3.2 Flashcards

1
Q

Split Tunnel

A

Split tunnel is means of encrypting connection on demand for VPN’s. It will only encrypt outbound traffic to private IP addresses.

In a split tunnel VPN, administrators decide where traffic is routed. A split tunnel can decipher whether traffic goes to a private network or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Always On

A

Always on VPNs allow for a continued connection between the geographically separated servers and the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UTM

A

Unified threat management (UTM) combines multiple security controls to provide a more robust security strategy and minimize the management of these devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Site-to-site

A

A site to site Virtual Private Network (VPN) connects multiple networks versus one. Remote users can access both locations as if they were onsite without noticing the location separation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL accelator

A

A Secure Socket Layer (SSL) Accelerator is designed to offload tasks from servers allowing network load to be distributed. It can provide a seamless service to consumers of network applications while balancing out session requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL decryptor

A

An SSL decryptor provides protection from malicious threats over secure connections and would be placed in the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DMZ

A

The Demilitarized Zone (DMZ) is between the two firewalls providing a layer of protection for the internet facing servers. It is an area of a network that is designed for public and company use. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ad hoc

A

An Ad Hoc zone is created when two or more wireless devices connect to one another creating an on-demand network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Guest

A

A guest network is a wireless network used to provide non-employees or guests with internet access. This access is limited to certain functions, such as internet surfing and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Normalization

A

Normalization is used to optimize database performance by removing duplicates, use of primary keys, and related data contained in separate tables. A database is considered normalized when it conforms to the first three forms of normalization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

firewall

A

A firewall filters traffic. It can be used for a single host or between networks. It regulates both inbound and outbound traffic, providing a layer of security inbound and out. Firewalls can be configured with Access Control Lists (ACL).

Firewalls allow the network administrator to divide the network into different network segments known as zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

load balancing

A

Load balancers can equalize the traffic load between servers eliminating unscheduled downtimes. Load balancing uses multiple servers to support a single service. Load balancing can ensure system availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAID

A

Redundant Array of Inexpensive Disks (RAID) provide increased system availability and fault tolerance for disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clustering

A

Clustering provides for high availability for servers and can remove the single point of failure. Clustering is similar to load balancing, but is more costly than RAID implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

single point of failure

A

A single point of failure is a critical component of a system that in the event it fails, the whole system can crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sensors

A

Sensors gather information to determine if the data being passed is malicious or not. The internet facing sensor will see all traffic and determine its intent. The sensor behind the firewall will only see filtered traffic. The sensors send findings to the NIDS console.

17
Q

Correlation engine

A

A correlation engine is part of a Security Information and Event Manager (SIEM). It captures and examines logged events to alert administrators of potential threats on a network.

18
Q

proxy

A

A proxy is a device that acts on behalf of another service. A proxy examines the data and makes rule-based decisions about whether the request should be forwarded or refused.

19
Q

bridge

A

A bridge is used to connect multiple networks.

20
Q

aggregation switch

A

An aggregation switch can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.

21
Q

wireless

A

The wireless topology is used to extend a wired local area network through the use of an antenna

22
Q

static code analyzers

A

A static code analyzer examines code quality and effectiveness without executing the code. An analyzer can be used in conjunction with development, for continued code quality checks, or once the code is in its finalization stages.

23
Q

airgap

A

An airgap is an isolated system not physically connected to other systems.

24
Q

static NAT

A

NAT is a protocol that alters public IP addresses to private IP addresses, to camouflage resources from the internet. Static NAT uses a one-to-one approach for disguising IP’s.

25
Q

Dynamic NAT

A

Dynamic Network address translation (NAT) uses multiple IP addresses to map one private IP to many public IP’s, disguising them from the internet. It chooses which IP to use based on the load presented.

26
Q

IPsec

A

Internet Protocol Security (IPSEC) is used to provide data authentication, integrity, and confidentiality between two points at the IP level. It is not compatible with NAT.

27
Q

subnet

A

A subnet is a division of an internet protocol range. It is not an appliance.

28
Q

switch

A

A switch is a device used to connect network devices.

29
Q

VPN concentrator

A

A Virtual Private Network (VPN) concentrator incorporates the most advanced encryption and authentication techniques to securely connect and access a private network through the public internet.

30
Q

SDN

A

A Software Defined Network (SDN) separates data and controls planes in a network. It uses virtualization to route traffic to its intended destination.

31
Q

remote access VPN

A

Remote access Virtual Private Network (VPN) allows an authorized user to connect to an internal network from a remote location. Software on the remote device creates an encrypted tunnel to a VPN concentrator on the internal company network.

32
Q

SSH

A

Secure Shell (SSH) encrypts moving traffic. While it can provide a secure connection for a remote user, it does not allow a user to connect to the company site while remote.

33
Q

port mirror

A

A port mirror is used to monitor network traffic. It forwards a copy of each packet from one switch port to another. aka TAP

34
Q

tunneling

A

Tunneling is a method of moving data in transit from one network to another. It encapsulates information, providing a private network to communicate through a public network.

35
Q

CASB

A

A Cloud Access Security Broker (CASB) is a part of security as a service, and monitors network traffic between a company’s network and cloud provider, enforcing security policies.

36
Q

Honeynet

A

A honeynet is a group of honeypots that mimic the functionality of a network. Once the honeynet has been penetrated by the attacker, administrators can observe the actions and gather information on the event

37
Q

honeypot

A

A honeypot is a server that is intentionally left open or available, so that an attacker will be drawn to it versus a live network.

38
Q

VLAN

A

A Virtual Local Area Network (VLAN) separates traffic between users, using a switch.

A Virtual Local Area Network (VLAN) is a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer and group users according to departments.

39
Q

extranet

A

An extranet is a zone created to allow authorized users access to company assets separate from the intranet.

More specifically for business partners/vendors