Lesson 5: Secure Enterprise Network Architecture Flashcards

1
Q

What does a secure network architecture support?

A

Confidentiality, integrity, and availability for workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key components of enterprise network architecture?

A

Network Infrastructure: Media, appliances, and protocols for connectivity.

Network Applications: Services supporting business tasks (e.g., email).

Data Assets: Information created and transferred by workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the layers of the Network Layers (OSI Model)?

A

Layer 1 - Physical

Layer 2 - Data Link

Layer 3 - Network

Layer 4 - Transport

Layer 5 - Session

Layer 6 - Presentation

Layer 7 - Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Network Layers (OSI Model): Layer 1 (Physical)

Provide examples

A

Transmits raw bit stream data over the physical medium

Examples:
- Twisted-pair cables
- Fiber Optic
- Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Network Layers (OSI Model):
Layer 2 (Data Link)

Provide examples

A

Defines the format of data on the network

  • Switches
  • MAC Addresses
  • VLANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Network Layers (OSI Model):
Layer 3 (Network)

Provide examples

A

Decides which path the data will take, determining the best path for data delivery

  • Routers
  • IP Addresses
  • Subnetting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Network Layers (OSI Model):
Layer 4 (Transport)

Provide examples

A

Transmits data using transmission protocols including TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Network Layers (OSI Model):
Layer 5 (Session)

Provide examples

A

Maintains connections and is responsible for controlling ports and sessions between applications.

Uses protocols like Syn/Ack (used in TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Network Layers (OSI Model):
Layer 6 (Presentation)

Provide examples

A

Handles data formatting, encryption, and compression, ensuring data is presented in a readable format.

Examples:
- Encryption protocols (SSL/TLS),
- Data Compression
- Character Encoding (ASCII, UTF-8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Network Layers (OSI Model):
Layer 7 (Application)

Provide examples

A

Provides network services to applications, allowing users to interact with the network

Examples:
- Hypertext Transfer Protocol (HTTP) for web browsing
- File Transfer Protocol (FTP) for file transfer
- Simple Mail Transfer Protocol (SMTP) for email
- Simple Network Management Protocol (SNMP) for network management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of VLANs?

A

VLANs segment networks into distinct broadcast domains. This improves security and performance.

Each VLAN maps to unique subnet, requiring routing for inter-VLAN communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are security zones used in a network?

A

They segregate workflows (ex. public-facing servers vs. internal clients).
They use firewalls to enforce least privilege and control traffic between zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does “defense in depth” mean in network security?

A

Implementing multiple layers of security to protect against intrusions by analyzing vulnerabilities at Layers 1-7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of port security?

A

MAC Filtering/Limiting: Limits the number of MAC addresses per switch port.

802.1X Authentication: Ensures secure authentication at switch ports using EAP and RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is physical isolation in a network?

A

Using air-gapped hosts/networks that are physically disconnected from other networks to secure critical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name three types of firewalls and their features.

A

Packet Filtering: Inspects IP, protocol, and port headers.

Stateful Inspection: Tracks session information to identify anomalies.

Layer 7 Firewalls: Application-aware filtering to inspect traffic content.

17
Q

What is the difference between IDS and IPS?

A

IDS (Passive): Captures traffic and raises alerts for suspicious patterns.

IPS (Active): Blocks or redirects malicious traffic.

18
Q

What is the role of load balancers?

A

They distribute traffic across server pools to enhance availability and prevent overload.

19
Q

What do Next-Generation Firewalls (NGFW) entail?

A

They integrate Intrusion Prevention Services (IPS), Deep Packet Inspection, Role-based policies, and cloud connectivity.

20
Q

What does “Unified Threat Management (UTM)” include?

A

A single appliance combining firewall, antimalware, spam filtering, VPN, and more.

21
Q

What distinguishes Layer 4 and Layer 7 load balancers?

A

Layer 4 load balancers, based on IP/TCP values , focus on routing based on IP addresses and ports.

Layer 7 load balancers, like Application Load Balancers (ALB), can inspect application-layer data for more complex routing. Its content-aware with session persistence.

22
Q

What does a Web Application Firewall (WAF) protect against?

A

It protects web applications against attacks like code injection and denial-of-service (DoS).

23
Q

What are the two main types of VPN architectures?

A

Client-to-Site VPN: Remote workers connect securely to corporate networks.

Site-to-Site VPN: Connects two networks, such as branch offices.

24
Q

What are the components of IPsec for VPNs and what do they do?

A

Authentication Header (AH): Verifies integrity.

Encapsulating Security Payload (ESP): Encrypts data for confidentiality.

25
What does Transport Layer Security (TLS) do?
It provides application-level encryption. Its used for securing communications over a network, including VPNs, by encrypting data and verifying the identities of communicating parties
26
What does the Internet Key Exchange (IKE) protocol handle in IPsec?
IKE handles mutual authentication, cipher selection, and key exchange for IPsec.
27
What is a Remote Desktop Access provide?
Remote Desktop Access (RDP) provides encrypted connections to physical/virtual desktops or apps. Alternatives to RDP is HTML5-based clientless remote desktop tools.
28
What is SSH used for?
Encrypts terminal access for administration and file transfers. Key features for SSH: - Host keys for server identification. - Authentication via username/password, public keys, or Kerberos tickets.
29
What are out-of-band (OOB) management channels used for?
Providing isolated management access for network appliances.
30
What is a Jump Server?
A dedicated admin server controlling access to secure zones, by acting as a central point of access, preventing direct access to sensitive systems from untrusted networks.