Lecture 8b Flashcards

(74 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of security appliances?

A

They directly address security and work with networking device security features for layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name some common security appliances.

A

Firewalls Proxy servers Deception instruments Intrusion detection and prevention systems Network hardware security modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a firewall examine network traffic?

A

Uses bidirectional inspection to examine outgoing and incoming packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are rule-based firewalls?

A

Firewalls that act based on specific predefined criteria or rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a policy-based firewall?

A

A firewall that uses generic policies rather than specific rules for more flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can firewalls filter content or URLs?

A

Yes firewalls can apply content and URL filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a rule-based firewall?

A

Uses specific predefined rules to allow or block traffic based on packet attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a policy-based firewall use for traffic filtering?

A

Uses high-level policies like user roles or applications for more flexible filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a stateless firewall operate?

A

Evaluates each packet independently without considering previous traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of a stateful firewall?

A

Tracks active connections and makes decisions based on traffic state and context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a hardware firewall?

A

A physical device dedicated to filtering traffic and protecting a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a software firewall?

A

A program installed on a device to monitor and control incoming and outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a virtual firewall?

A

A software firewall deployed in virtual environments to secure virtual machines or cloud networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a forward proxy?

A

A device that intercepts user requests from an internal network and processes them on behalf of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a reverse proxy?

A

Routes requests from an external network to the correct internal server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a proxy server protect internal endpoints?

A

By hiding their IP addresses and intercepting malware before it reaches them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of deception instruments in security?

A

To redirect threat actors away from valuable assets using honeypots and sinkholes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a honeypot?

A

A computer with limited security used as bait to lure and study attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are two goals of using honeypots?

A

Deflect attackers to decoys and discover attacker behaviors and tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a sinkhole in network security?

A

A device designed to redirect unwanted traffic to deceive attackers into thinking their attack succeeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the difference between IDS and IPS?

A

IDS detects attacks IPS attempts to block attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does an inline IDS/IPS system work?

A

Connected directly to the network and monitors data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does a passive IDS system work?

A

Connected to a switch port receiving a copy of network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are in-band and out-of-band management in IDS?
In-band uses network protocols Out-of-band uses an independent dedicated channel
26
Name four IDS monitoring methodologies.
Anomaly based Signature based Behavior based Heuristic based
27
What does anomaly-based monitoring compare?
Current behavior with a baseline of normal activity
28
What does signature-based monitoring detect?
Known attack signature patterns
29
What does behavior-based monitoring identify?
Abnormal actions by processes or programs
30
What question does heuristic monitoring try to answer?
Will this do something harmful if allowed to execute
31
What is a NIDS?
A network intrusion detection system that watches for network attacks
32
What is a NIPS?
A network intrusion prevention system that detects and stops malicious activities
33
What is a hardware security module (HSM)?
A removable external cryptographic device for key management and encryption
34
Where are HSM devices commonly connected?
USB ports expansion cards or direct computer ports
35
What cryptographic operations does an HSM perform?
Key management Key exchange Random number generation Key storage Symmetric and asymmetric encryption
36
What are access control lists (ACL)?
Rules that grant or deny access to digital assets
37
Name two types of ACLs.
Filesystem ACLs and Networking ACLs
38
What do router ACLs do?
Restrict vulnerable protocols and limit incoming network traffic
39
What is a VPN?
A technology that enables secure use of an unsecured public network
40
What are two common VPN types?
Remote access VPN and Site-to-site VPN
41
What is a full tunnel VPN?
Sends all traffic to the VPN concentrator for protection
42
What is a split tunnel VPN?
Routes only some traffic over VPN other traffic goes directly to the Internet
43
Name common VPN protocols.
IPsec and SSL
44
What is network access control (NAC)?
A system that checks device state before allowing network access
45
What happens to devices that fail NAC checks?
They connect only to a quarantine network for security fixes
46
What is the difference between permanent and dissolvable NAC agents?
Permanent stay on device Dissolvable report info then disappear
47
How can NAC integrate with Active Directory?
Using agentless NAC that scans devices via AD
48
What is data loss prevention (DLP)?
A system to recognize and protect critical data by enforcing usage policies
49
How do DLP systems inspect data?
Using content inspection of transactions within approved contexts
50
What happens when a DLP policy violation is detected?
The DLP agent reports it back to the DLP server
51
What is port security?
Preventing unauthorized access to network devices through physical ports
52
What is route security?
Trustworthiness of packets sent through routers preventing false route info
53
How is broadcast storm prevention achieved?
By using loop prevention with the IEEE 802.1d spanning-tree protocol STP
54
What does STP do?
Creates a hierarchical tree layout to prevent network loops
55
What do file integrity monitors do?
Check files for unauthorized changes to detect malware and maintain compliance
56
What is Quality of Service (QoS)?
Network technology that prioritizes bandwidth and resources for important traffic
57
How does a network administrator use QoS?
Assigns order of packet handling and bandwidth for applications called traffic shaping
58
What is network segmentation?
Dividing a network into logical groups to isolate sensitive data
59
What is a VLAN?
A virtual LAN that segments devices into isolated logical groups
60
What is a DMZ in network design?
A separate network outside a secure perimeter for untrusted outside users
61
What is a jump box?
A minimal admin server that connects different security zones with restricted access
62
What is load balancing?
Distributing network work evenly among devices to prevent overload
63
Name advantages of load balancing.
Reduces overload optimizes bandwidth and enhances security
64
How can load balancers improve security?
Detect and stop attacks hide error pages and remove server info
65
What is the difference between stateless and stateful packet filtering?
Stateless checks packets independently Stateful tracks connection state and context
66
Name three specialized firewall appliances.
Web application firewall WAF Next generation firewall NGFW Unified threat management UTM device
67
What does a forward proxy do?
Intercepts internal user requests and processes them on behalf of the user
68
What is the function of an intrusion detection system IDS?
Detects attacks as they occur
69
What does an intrusion prevention system IPS do?
Attempts to block attacks
70
What operations does a network hardware security module perform?
Cryptographic operations like key management key exchange and encryption
71
What does an access control list ACL do?
Contains rules to allow or deny access to digital assets
72
What does network access control NAC examine?
The current state of a device before network connection
73
What is the purpose of data loss prevention DLP?
To recognize and protect critical organizational data
74
How is broadcast storm prevention achieved?
Using spanning tree protocol STP IEEE 802.1d standard