Determine mitigations for network-related security threats Flashcards

(14 cards)

1
Q

What is the purpose of implementing a comprehensive approach to network security?

A

To ensure that one loophole or omission doesn’t result in further weaknesses upon which malicious users can capitalize.

Comprehensive security measures are essential to protect against various attack vectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Internet Protocol security (IPsec) do?

A

Authenticates IP-based communications between two hosts and encrypts network traffic where desirable.

IPsec is crucial for secure communications over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of firewalls in network security?

A

Allow or block network traffic based on the type of traffic.

Firewalls are a fundamental component of network security architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are perimeter networks?

A

Isolated areas on your network to define network traffic flow and allow services to be available on the Internet without exposing the corporate intranet.

Placing servers in a perimeter network enhances security by limiting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important for users to connect securely to their organization’s intranet?

A

To protect data in transit across the Internet from eavesdropping or MITM attacks.

Secure connections are vital as the Internet is a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are VPNs and DirectAccess used for?

A

To authenticate and encrypt connections between remote users and the organization’s intranet.

These technologies help mitigate risks associated with remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does server hardening involve?

A

Running only the services that you need to make servers inherently more secure.

Establishing a security baseline is crucial for determining necessary services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What tools can be used to determine required Windows Server services?

A

Security Configuration Wizard and Microsoft Baseline Security Analyzer.

These tools help assess and configure server security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of intrusion detection in network security?

A

To monitor the network regularly for signs of attack.

Intrusion detection systems are essential for early threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where should intrusion-detection systems be implemented?

A

On perimeter devices, such as Internet-facing routers.

This placement helps to monitor external threats effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Domain Name System Security Extensions (DNSSEC) do?

A

Uses digital signatures for validation so that DNS servers and resolvers can trust DNS responses.

DNSSEC helps prevent data modification and tampering in DNS responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The DNS zone contains all ______ that are generated in the new resource records.

A

signatures.

These signatures are crucial for validating DNS responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when a resolver issues a query for a name in DNSSEC?

A

The DNS server returns the accompanying digital signature in the response.

This process ensures the integrity of the DNS data received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is validated using a preconfigured trust anchor in DNSSEC?

A

The digital signature returned by the DNS server.

Successful validation indicates no tampering has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly