Network Segmentation Flashcards

(65 cards)

1
Q

What is a Firewall?

A

Common network security device that acts as a barrier to networks

Uses a set of rules to define permitted or denied traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Firewalls

A
  • Software/Hardware Based
  • Virtual/Physical devices
  • Host/Network Based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What functions can a Firewall perform?

A
  • Performs Network Address Translation (NAT)
  • Performs Port Address Translation (PAT)
  • Can use one public IP and many private IPs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Packet Filtering Firewall?

A

Permits or denies traffic based on packet headers

this is all or nothing all or deny

Uses Access Control Lists (ACLs) for decision-making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Stateful Firewall?

A

Inspects traffic as part of a session

keeps track of what’s requested and let them in

Allows incoming traffic that corresponds to outgoing requests

BAD for phishing because users can request(click) on bad emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Next-Generation Firewall (NGFW)?

A

Conducts deep packet inspection (DPI) for detailed traffic analysis

Operates at layers 5, 6, and 7 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Access Control Lists (ACLs)?

A

Sets of rules assigned to routers or firewalls that permit or deny traffic

work from Top to Bottom

Based on IP/MAC address or port depending on device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between Explicit Allow and Explicit Deny in ACLs?

A
  • Explicit Allow: Specified in ACLs using ‘permit’ statements
  • Explicit Deny: Statement used to block specific types of traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Implicit Deny in ACLs?

A

Statement automatically applied at the end of an ACL if no explicit deny statements are present

means anything that has not already been allowed should be denied EX: (Deny IP any any)

Blocks all traffic that is not explicitly permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Segmentation Zones?

A
  • Trusted Zone
  • Untrusted Zone
  • Screened Subnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a Jumpbox?

A

Provides a choke point for network security measures, enhancing protection for hosted servers

hardened server

1 server that can talk to screened subnet. only jump box can communicate from internal network to the screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Content Filtering?

A

A network management practice that involves restricting access to certain content based on specific criteria

To conserve network bandwidth or comply with policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the techniques used in Content Filtering?

A
  • URL Filtering - blocking based on URL (most common form - used in the workplace settings)
  • Keyword Filtering - scanning for specific phrases or keywords (may over-block)
  • Protocol or Port Filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Internet of Things (IoT)?

A

A global network of appliances and personal devices equipped with sensors and network connectivity

To report state and configuration data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are best practices for IoT security?

A
  • Segregation of networks
  • Ensure devices are properly secured
  • Change default credentials
  • Use encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Operational Technology (OT)?

A

A communications network designed to implement an industrial control system
TECHNOLOGY THAT INTERACTS WITH THE REAL WORLD
AVAILABILITY = MOST IMPORTANT
SCADA

Deals with controlling machinery and processes in the physical world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Supervisory Control and Data Acquisition (SCADA)?

A

A type of ICS used to manage large-scale, multi-site devices and equipment

MANY DIFFERENT ICS AND DCS

type of OT

Spread over a geographic region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Bring Your Own Device (BYOD) policy?

A

Policy allowing employees to use their personal devices for work purposes

Introduces vulnerabilities from personal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Mobile Device Management (MDM)?

A

Centralized software for remote administration and configuration of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Choose Your Own Device (CYOD) allow?

A

Employees choose from a selection of supported devices provided and managed by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fill in the blank: A _______ is a hardened server that provides access to other hosts within the screen subnet.

A

Jumpbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does CYOD stand for?

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the benefits of CYOD?

A
  • Installation of MDM
  • Enforcing technical policies
  • Preventing data loss
  • Controlling device features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What must organizations decide on regarding mobile devices?

A

A mobile device security policy that suits their needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the Zero Trust concept?
A modern approach to cybersecurity due to sophisticated threats
26
Why are traditional security strategies ineffective against modern threats?
Due to de-perimeterization
27
What is de-perimeterization?
* Protecting systems and data using encryption * Secure protocols * Host-based protection
28
What are the principles of Zero Trust?
* Trust nothing * Verify everything * Verify every device, user, and transaction regardless of origin
29
What does the Zero Trust Architecture control plane do?
Defines, manages, and enforces access policies
30
What is an Adaptive Identity in Zero Trust?
Real-time validation based on behavior, device, and location
31
What is the purpose of Threat Scope Reduction?
Limiting user access to minimize attack surface
32
What is Policy-driven Access Control?
Enforcing access based on roles and responsibilities
33
What are Secured Zones in Zero Trust?
Isolated environments for sensitive data access
34
What does a Policy Engine do?
Cross-references access requests with predefined policies
35
What is required for access in a Zero Trust environment?
Continuous verification regardless of location or origin
36
What is a Virtual Private Network (VPN)?
Extends a private network across a public network for secure data transmission
37
What are the types of VPNs?
* Site-to-Site VPN * Client-to-Site VPN * Clientless VPN
38
What tunneling protocol is used for secure web browsing?
Transport Layer Security (TLS)
39
What is the difference between Full Tunnel and Split Tunnel in VPN configuration?
* Full Tunnel: Routes and encrypts all traffic through the VPN * Split Tunnel: Divides traffic, encrypting only traffic bound for headquarters
40
What is Layer 2 Tunneling Protocol (L2TP)?
An early VPN lacking security features like encryption by default
41
What is the purpose of IP Security (IPsec)?
Provides authentication and encryption of packets for secure communication
42
What does Telnet operate on?
Port 23
43
What is the main security feature of Secure Shell (SSH)?
Encrypts data sent between client and server
44
What is the Remote Desktop Protocol (RDP) used for?
Graphical interface remote connections
45
What does Remote Desktop Gateway (RDG) do?
Creates secure connections to servers via RDP using SSL or TLS
46
What is Virtual Network Computing (VNC)?
Allows remote access with a graphical interface, designed for thin client architectures
47
What is the difference between In-Band and Out-of-Band Management?
* In-Band Management: Uses Telnet or SSH over the network * Out-of-Band Management: Uses a separate network for device configuration
48
What is an Application Programming Interface (API)?
Set of protocols and routines for building and interacting with software applications
49
What are the two common types of APIs mentioned?
* Representational State Transfer (REST) * Simple Object Access Protocol (SOAP)
50
Unified Threat Management (UTM) System
■ Combines firewall, router, intrusion detection/prevention, malware solutions, and other security devices ■ Generally considered a border device with next-generation firewall capabilities ■ Available as physical, virtual, or cloud solutions
51
What is the Trusted Zone in segmentation zones?
Local Area Network (LAN), also known as the Inside Zone, represents the corporate intranet ## Footnote The Trusted Zone is where internal corporate resources are located.
52
What does the Untrusted Zone include?
Includes the internet and other external networks ## Footnote Traffic from the internet to the trusted zone is typically blocked, except for responses to specific requests.
53
What is a Screened Subnet?
A semi-trusted zone between the trusted and untrusted zones containing devices like web servers and email servers Allows hosted servers like email and web servers to be accessible from both internal and external networks ● Without the screened subnet, servers hosted inside the network would be inaccessible or less useful to external users ## Footnote It has restricted access from the untrusted zone and is not fully trusted by the internal network.
54
What traffic is allowed from the Trusted Zone to the Screened Subnet?
Traffic from internal to the screened subnet is allowed, but traffic is restricted ## Footnote Return traffic from screened subnet devices is allowed.
55
What access do Screened Subnet devices have to the Untrusted Zone?
Screened subnet devices can access the internet freely ## Footnote Certain inbound ports need to be open for services like email and web hosting.
56
Fill in the blank: The Local Area Network (LAN) is also known as the _______.
[Inside Zone]
57
True or False: The Screened Subnet is fully trusted by the internal network.
False
58
Internet-facing hosts
■ Hosts or servers that accept inbound connections from the internet ■ Example ● Web server on a screen subnet
59
screened subnet
anything that someone needs access to should be placed here
60
Bastion Host
● A host or server in the screen subnet that is not configured with services that run on the local network ● Example ○ Email server ○ Web server ○ Remote access server
61
Proxy Servers
■ Act as intermediaries between a user's device and the internet ■ Manage internet traffic and can be used for various purposes, including content filtering
62
What is a Web Proxy?
Retrieves web pages from the internet and can be used to bypass content filters ## Footnote Web proxies act as intermediaries between users and the internet.
63
What is the primary function of a Reverse Proxy?
Manages incoming internet traffic to an organization, load balancing, improving security, and performance ## Footnote Reverse proxies can also serve cached content and handle SSL encryption.
64
What does a Transparent Proxy do?
Monitors and filters internet traffic, blocking access to specific websites or content types, and enforcing company policies ## Footnote Transparent proxies do not require any configuration on client devices.
65
Types of IoT devices
■ Building and Home Automation Systems ● Manage lighting, HVAC, water, and security systems ■ IP Video Systems ● Provide remote collaboration using video teleconference suites ■ Audio Visual Systems ● Stream live video productions and control multiple displays ■ Physical Access Control Systems ● Determine access into secure areas ○ Proximity readers ○ Access control systems ○ Biometric readers ■ Scientific and Industrial Equipment ● Found in hospitals, factories, and laboratories ● Allows centralized monitoring and management