Domain 2.1 Install and configure network components, both hardware- and software based, to support organizational security. Flashcards

1
Q

Number 1 VPN tunnel in the world

A

IPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a piece of hardware designed to protect one network from another?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a Packet filtering firewall filter traffic based on?

A

– Source and Destination IP
– Port Numbers
– Protocols Used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is another name for a layer 7 firewall?

A

Application Firewall - Opens and inspects every packet on layer 7 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateful Inspection Firewall

A

Keeps a state table to track every communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A list of rules that determine what traffic to block, and what to allow

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what locally installed security control is Used to prevent application specific protocol and payload attacks?

A

Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hardware device designed for general network filtering.

– Provides protection for the network.

A

Network Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ firewalls analyzes packets on an individual basis against the filtering ACL.

A

Stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unless some traffic is explicitly allowed it will be Denied.

A

Implicitly denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a VPN?

A

A secure tunnel through an unsecured internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a VPN do?

A

Secures the private network, using encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN concentrator

A

Gives all the VPNs a label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Site-to-Site VPN

A

Site-to-site refers to the connection of separate sites through a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote access VPN

A

Remote Access refers to connecting single entities or hosts through a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At what layer of the OSI model does a VPN operate?

A

Layer 3 - Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An IPSEC VPN tunnel uses ___ by default.

A

AES - Advanced Encryption Standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What part of the packet does AH encapsulate

A

the outside of the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does ESP do?

A

ESP encapsulates the data inside the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

using a pre-existing VPN tunnel to exchange keys is called.

A

IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISAKMP

A

a VPN tunnel setup to send symmetric keys across.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IPSEC Tunnel mode

A

Encrypts the Header, payload and Footer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPSEC Transport mode

A

Encrypts only the payload of the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of tunnel routes all traffic across the tunnel?

A

A full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What type of tunnel routes only specific traffic across the tunnel, and routes internet bound traffic outside of the tunnel.
Split tunnel
26
What layer of the OSI model does TLS operate on?
Layer 4 - The Transport Layer
27
Host based Intrusion detection system (HIDS)
an IDS installed on your specific computer
28
Network Based intrusion detection system (NIDS)
an IDS on the network, protecting all devices on your network.
29
What device analyzes data, logs attacks, and notifies you.
Intrusion Detection System
30
what is a HoneyPot?
A server setup to entice an attacker.
31
What device analyzes data and prevents attack, and notifies you.
IPS - Intrusion Prevention System.
32
NIPS
Network Intrusion Prevention System
33
HIPS
Host intrusion Prevention System
34
a known attack
a signature based attack
35
requires a baseline to evaluate for normal or abhorrent operation
Behavior based IPS/IDS
36
Compares suspicious programs vs known malware
Heuristics ("watching trends" on the exam)
37
A flagged event that isn’t really an event and has been falsely triggered
False positive
38
An event that should be flagged but isn’t.
False negative
39
firewalls have _____ and routers have ____
firewalls have RULES and routers have ACLs
40
Port Security AND wireless security
802.1X
41
RADIUS port
port 1812
42
A _________ switch works on Layer 2 and Layer 3 of the OSI Model.
Multilayer Switch / Layer 3 Switch
43
Cisco proprietary Loop prevention
Spanning Tree Protocol (STP)
44
Flood Gaurd
Stops buffer overflow - A flood guard will prevent your system or network from accepting more than it can handle
45
a packet that is 9000 bytes
a Jumbo packet
46
A ______ _______ goes to the internet on your behalf.
A Proxy Server
47
a Proxy server ________ the websites you visit most often
Caches/stores
48
what does a load balancer do?
routes traffic to multiple servers to ensure availability
49
Active-Active
If one goes down the other is already active and in use.
50
Active-passive
If one goes down the second/backup will activate and begin usage.
51
Access Point
A device that creates a wireless local area network, or WLAN, usually in an office or large building. (For testing purposes it is a network extender)
52
802.11a
54 Mbps - 5 GHz
53
802.11b
11 Mbps - 2.4 GHz
54
802.11g
54 Mbps - 2.4 GHz
55
802.11n
200+ Mbps - 2.4 GHz or 5 GHz or both
56
802.11n uses a unique technology called?
uses MIMO - two or more antenna. multiple input multiple output.
57
The name of your wireless network
Service Set identifier (SSID)
58
Each host is allowed or denied based on their mac address.
MAC filtering
59
According to CompTIA there are 3 wireless channels you can use.
1, 6, and 11
60
what antenna type goes 360 degrees
omni-directional - rubber-duck
61
a direction antenna does what?
forces the signal in one direction, and since it is focusing the signal, it can cover a greater distance with a stronger signal. also called a YAGI antenna.
62
Security Information and Event Management (SIEM)
provide real-time analysis of security alerts that are flagged by network appliances and software applications (aggregation.)
63
write-once-read-many (WORM)
is built into many SIEMS. means that once the data is written you should not be able to edit it.
64
What is DLP?
Data Loss Prevention (DLP) systems monitor the contents of systems (workstations, servers, and networks) to make sure that key content is not deleted or removed.
65
What is Tripwire?
File Integrity Verifier (VIF), that is utilized in a DLP environment. It will inform you if anyone accessed data.
66
Network Access Control
a set of standards defined by the network for clients attempting to access it so that only known devices meeting specified requirements can connect. (similar to 802.1x)
67
SSL Accelerators
Since encrypting data is very processor intensive, accelerators can be used to offload the public-key encryption to a hardware accelerator, which is a separate plug-in card (usually into a PCI slot).
68
trusted platform module
a chip on the motherboard called a crypto-processor that performs encryption and decryption,
69
Bitlocker
a microsoft program used for whole disk or full disk encryption.
70
``` Which of the following devices is typically used to provide protection at the edge of the network attack surface? A. Firewall B. Router C. Switch D. VPN concentrator ```
A. Firewall
71
``` In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be configured to provide remote access? (Select TWO). A. Subnetting B. NAT C. Firewall D. NAC E. VPN ```
C. Firewall | E. VPN
72
``` What type of wireless antenna can be used to send or receive signals in any direction? A. Cantenna B. Yagi C. Rubber duck D. Panel ```
C. Rubber duck
73
``` You have recently had some security breaches in the network. You suspect the cause might be a small group of employees. You want to implement a solution that monitors incoming external traffic. Which of the following devices would you use? A. A router B. A network-based IDS C. A VPN D. A host-based IDS ```
B. A network-based IDS