Network Security Operations Flashcards

(31 cards)

1
Q

packet filtering firewall

A

inspects source and destination IP, limit placed on packets that can enter the network - operates at layer 3 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

stateful inspection firewall

A

every packet is analyzed, categorized, and a security decision is made - operates at layers 3, 4, 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

stateless firewalls

A

does not keep track of traffic flows, needs 2 rules to reach destination point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

application level firewall

A

blocks program-level traffic and analyzes packet content - operates at level 7 (and below)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

application layer attack - SQL injection attack solution

A

leverage a reverse proxy system and scan incoming packets for malicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

presentation layer attack - man in the middle attack solution

A

mitigate using an application-layer proxy or IPS, and train users about fake security certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

session layer attack - RPC solution

A

mitigate with regular OS and application patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

transport layer attack - port scanner solution

A

mitigate by using a packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network layer attack - ping sweep attack solution

A

mitigate by using packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data link layer - VLAN hopping solution

A

configure the VLAN tagging per the switch vendor’s recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physical layer - wiretapping solution

A

look for physical vulnerabilities, check locks on doors, racks, wiring closets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WEP

A

use pre-shared key and RC4 algorithms, weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA

A

uses RC4 algorithms and TKIP which rekeys every 10,000 packets (better than WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA2

A

uses AES and CCMP (most used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA3

A

strongest but newer, not so much used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ad-hoc wireless infrastructure mode

A

all wireless communication is performed in a peer-to-peer fashion and does not require a WAP

17
Q

infrastructure wireless network infrastructure mode

A

a WAP or wireless router is used to connect wireless devices to the network

18
Q

symmetric encryption

A

uses the same key

19
Q

asymmetric encryption

A

one public and one private key

20
Q

SSL - secure socket layer

A

uses an asymmetric key pair, end-to-end encryption

21
Q

TLS - transport layer security

A

successor to SSL

22
Q

IDS (intrusion detection system)

A

designed to monitor both inbound and outbound data traffic and report on any suspicious activity

23
Q

IPS (intrusion preventions system)

A

has capability to stop or prevent malicious attacks that is detects in real time by integrating with the firewall

24
Q

packet shaper

A

device that sits between a campus network and an outside network and is configured with a set of rules used to prioritize data traffic for shaping bandwidth

25
PIPEDA requires orgs to do this with people's information
explain how personal identifiable info is collected, used, and disclosed
26
wireless encryption method that includes each device using a unique encryption key
WPA3
27
primary goal of separation of duties in IT security
prevent fraud and unauthorized data access by requiring more than one person to complete certain tasks
28
redesigning protocols to fit more naturally into daily workflows for people serves what security principle?
psychological acceptability
29
in discretionary access control systems, who typically has authority to set or change permissions?
owner of the resource
30
wireless encryptions from weakest to strongest
WEP -> WPA -> WPA2 -> WPA3
31
sophisticated firewall that examines individual packets and their collective grouping represents what type of access control?
context based