S17-Network Segmentation Flashcards

(87 cards)

1
Q

Firewall

A

Uses a set of rules defining the types of traffic permitted or denied through the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F A firewall can’t perform Network Address translation (NAT) and Port address translation (PAT)

A

False, some physical Firewall hardware sitting at the edge of your network can preform NAT and PAT functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet-Filtering Firewall

A

Permits or denies traffic based on packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful Firewall

A

Inspects traffic as part of a session can recognizes where the traffic originated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NextGen Firewall (NGFW)

A

combines basic firewall functions with advanced features like:
- deep packet inspection
- intrusion prevention
- application control
- Threat intelligence
- Layer 7 Inspection
to offer more robust protection against modern cyber threats. operates in L5, L6, L7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deep Packet inspection (DPI)

A

NGFWS examine the data within network packets, not just the headers, to detect and block malicious content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

intrusion Prevention System (IPS)

A

NGFWs actively monitor network traffic for suspicious activity and take steps to prevent or mitigate attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Control

A

NGFWs can identify and control which applications are allowed to access the network, reducing the risk of unauthorized applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Intelligence

A

NGFWs often integrate with threat intelligence feeds, which provide information about the latest cyber threats, allowing them to better protect against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 7 Inspection

A

NGFWS can operate at the application layer (Layer 7), allowing them to inspect the contents of network traffic and block malicious requests or payloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control List (ACL)

A

List of permissions associated with a given system or network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unified Threat Management (UTM) Device

A

combines firewall, Router, intrusion detection/prevention system, anti-malware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are somethings you may want to block on your ACL?

A
  • Requests from internal or private loopback addresses and multi Cast ranges
  • incoming requests from local protocols
  • Either block all Ipv6 traffic or allow it to authorized hosts/ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explicit Deny

A

Blocks matching traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Role-Based Access

A

Defines the privilege’s and responsibilities of admin users who control firewalls and their ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted Zone/Inside Zone

A

Intranet or LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Untrusted Zone/ Outside Zone

A

Internet or External network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Screened Subnet

A

often referred to as a Demilitarized Zone (DMZ) or perimeter network, is a network configuration that isolates public-facing servers from the internal network.
- semi-trusted zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Internet-Facing Host

A

Any host that accepts inbound connections from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What things should be placed in the screened subnet?

A

Anything that receives inbound traffic from the internet:
- Email server
- Web server
- Remote access servers
- Proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Bastion Host

A

Hosts or servers in the screened subnet which are not configured with any services that run on the local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Jumpbox

A

Hardened server that provides access to other hosts within the screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are action executed in an ACL?

A

IN a TOP - DOWN manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

how are rules positioned in an ACL?

A

More Specific rules toward the top , more generic rules towards the bottom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What key pieces of information are found in ACL rules?
- Traffic type - Traffic Source - Traffic Destination - Action against Traffic
26
Content Filtering
Network Management practice that involves restricting access to certain content, websites, or applications based on specific criteria
27
URL Filtering
Block access to specific websites based on URLs
28
Keyword Filering
Scanning a webpage for keywords and blocking it from being displayed if any of the blocked keywords are detected
29
Protocol/Port Filtering
blocking traffic based on protocol or port used
30
Proxy Server
acts as an intermediary between a user's device and the internet, handling web requests on their behalf
31
Web Proxy
Used to retrieve Webpages from the internet
32
Reverse Proxy
Used by businesses to manage incoming internet traffic
33
Transparent Proxy
Used by businesses to monitor and filter internet traffic
34
why is a Proxy Server useful?
1- can filter out malicious traffic & prevent unauthorized access 2 - Can hide a user's IP address 3 - Block access to websites or types of content 4 - cache frequently accessed resources & improve performance
35
Internet of Things (IoT)
global network of appliances and personal devices that have been equipped with sensors, software, and network connectivity
36
Types of IoT devices
- Hub & Control systems - Smart Devices - Wearables - Sensors
37
Hub & Control system (IoT)
Used as a central point of communication for many automation and control of IoT devices
38
Smart Devices
IoT Endpoints that connect back to a central hub/Control system to provide automation or function
39
Wearables
IoT devices that are designed as accessories that can be worn
40
Sensors
IoT devices that measure factors like temperature, sound, light, humidity, pressure, proximity, motion, smoke, fire, heart rates, etc.
41
Operational Technology (OT)
the hardware and software that monitor and control physical devices, processes, and infrastructure, often in industrial environment
42
Industrial Control Systems (ICS)
. Systems that control and monitor industrial processes, by controlling machinery using embedded devices - single plant/system
43
IT vs OT
IT: Focuses on managing data, information, and systems. OT: Focuses on controlling physical devices and processes.
44
Supervisory Control and Data Acquisition (SCADA)
Type of ICS used to monitor and control industrial processes in real-time, often from a central location. - Different ICSs & DCSs interconnected in a WAN
45
Distributed Control Systems (DCS)
Used to manage and control complex industrial processes, such as those in chemical plants and oil refineries - System consisting of Multiple interconnected ICSs
46
Fieldbus
Digital serial data communication protocol used in OT networks to link different PLCs
47
Programmable Logic Controller (PLC)
a specialized computer designed to control industrial processes.
48
Human-Machine Interface (HMI)
A local control panel or software that runs on a computer
49
Storage Segmentation
Clear separation between personal and company data on a single device
50
Mobile Device Management
Centralized software solution for remote admin and config on mobile devices
51
CYOD
"Choose your own device"
52
Zero Trust Architecture (ZTA)
A security framework that operates on the principle of "never trust, always verify.
53
What are the 2 planes in ZTA?
- Control Plane - Data Plane
54
Control Plane (ZTA)
responsible for making access decisions and managing policies that govern how users and devices are authorized to access network resources. -
55
Key elements on the Control Plane (ZTA)
- Adaptive Identity - Threat Scope Reduction - Policy-driven access control - Secured zones
56
Adaptive Identity
Real-time validation that considers user behavior, Device, Location , Etc.
57
Threat Scope reduction
Limit users' access to only work-related tasks
58
Policy- Driven Access control
Developing, Managing, and enforcing user access policies based on their roles and responsibilities
59
Secured Zones
Isolated Environments in a network for sensitive data
60
Data Plane (ZTA)
handles the actual data traffic and application communication. Ensures that all communication is encrypted, monitored, and verified, adhering to the trust-none, always verify principle.
61
Data Plane Vs Control Plane
Control Plane: - Layout of policies and procedures Data Plane: - Execution of Policies and procedures
62
Data Plane key elements
- Subject Systems - Policy Engine - Policy Admin - Policy Enforcement Point
63
Subject Systems
Individual or entity attempting to gain access
64
Policy Engine
Cross-references the access requests with its predefined policies
65
Policy Admin
Used to establish and manage the access policies
66
Policy Enforcement Point
Where access decisions are executed
67
What 2 components form the Backbone in a ZTA?
- The Policy Admin - The Policy Engine
68
Full Tunnel VPN
Routes and Encrypts all network requests through the VPN connection back to the headquarters
69
Half/Split Tunnel VPN
allows users to route only specific internet traffic through the VPN, while other traffic can bypass the VPN and connect directly to the internet
70
Split Tunnel vs Full Tunnel
Full tunnel - Better Security Split Tunnel - Better Performance
71
Clientless VPN
Creates a secure, remote-access VPN tunnel using a web browser without requiring a software or hardware client
72
Site to site VPN
creates an encrypted tunnel between two or more networks, allowing them to communicate securely over the internet as if they were on the same network
73
Client to Site/ Remote access VPN
enables a single user's device (like a laptop or phone) to securely connect to a company or organization's network
74
Datagram Transport Layer Security (DTLS)
UDP-Based version of TLS
75
Layer 2 Tunneling Protocol (L2TP)
a protocol used to create VPN connections by encapsulating data for secure transmission over public networks.
76
L2TP drawbacks
Lacks Encryption and needs to be combined with another encryption layer
77
Layer 2 Forwarding (L2F)
Tunneling protocol for the P2P protocol but lacks native security and encryption features
78
Point-to-Point Tunneling Protocol (PPTP)
older vpn tunneling that Supports Dial-up networks but lacks native security features, unless used with windows
79
Telnet
Uses port 23 - sends plain, text-based commands to remote devices
80
Secure Shell (SSH)
Port 22 - Encrypts everything between a client and server
81
Remote Desktop Protocol (RDP)
Port 3389 - Remote Access technology the features a GUI - Microsoft Protocol - not secure
82
Remote Desktop Gateway (RDG)
Provides a secure connection using SSL/TLS protocols via RDP - used to secure RDP
83
Virtual Network Computing (VNC)
Port 5900 - Designed for thin client Architectures and things like virtual desktop infrastructure (VDI) - works like RDP but is Cross-Platform
84
Virtual Desktop Infrastructure (VDI)
Hosts a desktop environment on a centralized server through virtualization (DaaS) Desktop as a service
85
In-Band Management
Managing devices through the use of Telnet or SSH protocols over the network
86
Out-of-Band Management
Connecting to a configuring different network devices using an alternate path or management network
87
Application Programming Interface (API)
Set of protocols and routines for building and interacting with software applications