Network Security Flashcards

(48 cards)

1
Q

Confidentiality

A

Prevents disclosure of information to unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensuring that data has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Information is accessible to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVE

A

Common Vulnerabilities and Exposures - a database containing known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero-Day Vulnerability

A

One that has never been detected or published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Least privilege

A

Giving people just enough privileges to do their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Role-based Access

A

Your access is based on your role in the organization. In Windows, use Groups to provide this type of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust

A

Everything must be verified. Nobody is trusted until authentication is provided by the user. Systems are constantly monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network segmentation enforcement

A

Physical segmentation (using separate devices) or VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Screened subnet

A

Formerly a “DMZ” - a separate subnet containing assets that outside users need access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Separation of duties

A

Limit what a single person can do: split knowledge, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network access Control

A

IEEE 802.1X - Port-based Network Access Control (NAC). The physical ports require authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot

A

Fake virtual systems put in place to lure attackers so they can be monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifactor authentication

A

Something you are
Something you have
Something you know
Somewhere you are
Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TACACS+

A

Remote authentication protocol. Released as an open standard in 1993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSO

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RADIUS

A

Common AAA protocol; supported on wide variety of devices. Centralized authentication for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LDAP

A

Protocol for reading/writing directories over an IP network. Can be used as authentication protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Kerberos

A

Network authentication protocol; authenticate once (SSO). Mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Local authentication

A

Credentials are stored locally on the machine you’re trying to access.

21
Q

802.1X

A

Port-based Network Access Control; no access to network until you authenticate.

22
Q

EAP

A

Extensible Authentication Protocol; an authentication framework that integrates with other systems.

23
Q

Threat Assessment

A

Research the threats and make decisions based on the information. Then invest in most appropriate protection.

24
Q

Vulnerability Assessment

A

Minimally invasive process to identify potential vulnerabilities (vulnerability scanner); test from outside and inside

25
Penetration Testing
A simulated attack on a system.
26
Posture Assessment
Checks if a BYOD device is trusted, healthy, clean, etc., and has proper apps installed and settings enabled.
27
Risk Assessment
Identify assets that can be affected by an attack.
28
SIEM
Security Information and Event Management - a log of security events and information.
29
Denial of Service
When a particular service is forced to fail (usually by overloading it)
30
On-Path Attack
(Formerly Man-in-the-middle attack). An attacker redirects traffic (for monitoring) which then gets passed to the destination.
31
ARP Poisoning
An attacker can pretend to be a router by responding to ARP requests with its own MAC
32
Switch spoofing
Switch ports can be configured as access port or trunk port. Automatic config of these can lead to an attacker plugging in a laptop and negotating trunk access.
33
Double tagging
Packets are crafted with two VLAN tags. The first native VLAN tag is removed by one switch, and the second one is visible to a second switch. One-way traffic. To mitigate, don't put devices on native VLAN.
34
Rogue DHCP server
Non-authorized DHCP server handing out IP addresses. DHCP snooping can prevent this.
35
Rogue access point
An unauthorized wireless access point can lead to unauthorized access to your network. 802.1X can prevent this.
36
Wireless evil twin
A rogue AP that looks legitimate but is actually malicious. Encryption can prevent these from stealing information.
37
Wireless deauthentication
Attackers can send specially crafted frames to disconnect clients, using 802.11 management frames. 802.11w encrypts management frames to mitigate this.
38
Secure SNMP
SNMPv3 encrypts traffic, but not all devices support it.
39
RA Guard
Router Advertisement (IPv6) Guard Prevents attackers from pretending to be a router and sending RA messages.
40
DAI
Dynamic ARP Inspection - can prevent on-path attacks by using DHCP snooping.
41
Control plane policing
Can secure a device using the control plane by limiting the amount and type of traffic or preventing types of traffic (Telnet, for example) that is allowed.
42
Port Isolation
Limits the access between devices on different interfaces on a switch (even if they're on the same VLAN).
43
MAC Filtering
Can block unwanted devices, but is easy to circumvent by spoofing MAC addresses.
44
Wireless client isolation
Devices connected to the network can get on the Internet but not see each other
45
EAP
Extensible Authentication Protocol - a framework that can be used for wireless authentication
46
VPN Concentrator
Device that VPN clients connect to (often integrated into a firewall)
47
Remote Desktop Protocols
RDP (Windows, but has clients for MacOS, Linux, etc.) VNC
48
Out of band management
"Direct" connection (serial/USB), console connection, etc.