Week 1 Flashcards

(56 cards)

1
Q

what are the 5 weaknesses of a network design

A

Single point failure
Complex dependencies
Availability over confidentiality and integrity
Lack of documentation and change control
Overdependency on perimeter security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between physical and logical topology?

A

Physical: Real layout (cables/devices)

Logical: Data flow paths (VLANs/IP routes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a zone in networking?

A

A zone is an isolated network segment with similar security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is traffic managed between zones?

A

It’s filtered and controlled by a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 main types of network zones?

A

Intranet (Private)

Extranet (Partner Access)

Internet (Public)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are access blocks in enterprise architecture?

A

Host groups based on roles, grouped into zones for control and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DMZ (Demilitarized Zone) in networking?

A

A DMZ isolates Internet-facing hosts from the internal network for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Should internal communication pass through the DMZ?

A

No – direct communication through the DMZ should not be allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How should communication to/from the DMZ be handled?

A

Use proxies to rebuild and filter packets before forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are bastion or jumpbox hosts?

A

Special-purpose servers in the DMZ

Not fully trusted by the internal network

Run minimal services

No local account credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a screened subnet?

A

A network setup that uses two firewalls to protect the DMZ—one on each side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the edge firewall do?

A

Sits between Internet and DMZ

Allows only permitted traffic to DMZ

Also called the screening firewall/router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the internal firewall do?

A

Sits between DMZ and LAN

Filters traffic from DMZ to internal network

Also called the choke firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a choke point?

A

A narrow, controlled gateway that makes monitoring and access control easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a triple-homed firewall?

A

A single router or firewall with three network interfaces:

One for Public/Internet

One for the DMZ

One for the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a triple-homed firewall control traffic?

A

It uses routing and filtering rules to control what traffic can pass between:

Internet ↔ DMZ

DMZ ↔ LAN

Internet ↔ LAN (usually blocked)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a triple-homed firewall achieve?

A

It provides the same level of separation and control as a screened subnet but uses just one device instead of two firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why might small networks not use a full DMZ setup?

A

Due to limited budget or technical expertise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What can smaller networks use instead of a DMZ?

A

A dual-homed proxy/gateway server, acting as a screened host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a dual-homed gateway?

A

A system with two network interfaces (NICs):

One connected to the Internet (untrusted)

One connected to the internal network (trusted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of a dual-homed gateway?

A

To securely control access between the internal network and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a forward proxy server do?

A

It opens connections to the Internet on behalf of internal clients.

24
Q

What can a forward proxy server include?

A

Application-specific filters (e.g., web filtering)

User authentication

Can be transparent (hidden from users) or non-transparent (visible)

25
What is a common use of a reverse proxy?
It opens connections to internal servers on behalf of external clients.
26
What is a common use of a reverse proxy?
To protect internal web servers, balance load, or cache content for faster delivery.
27
cyber attackers strategize their way to infiltrate an ­organization’s network and exfiltrate data, what are the series of stages that comprise the attack lifecycle
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Act on Objective
28
What happens in Stage 1: Reconnaissance?
Attackers gather info on targets (e.g., via phishing, LinkedIn, network scans).
29
What happens in Stage 2: Weaponization?
Malware is created to exploit found vulnerabilities. Happens outside the network.
30
What happens in Stage 3: Delivery?
Malware is sent—via email, fake files, or malicious websites.
31
What happens in Stage 4: Exploitation?
Malware runs on the device, exploiting a vulnerability to gain access.
32
What happens in Stage 5: Installation?
Malware installs a backdoor or rootkit for long-term access
33
What happens in Stage 6: Command & Control (C2)?
Attacker communicates with infected device, sending commands and updates.
34
What happens in Stage 7: Act on Objectives?
The attacker steals data, causes damage, or uses the device to reach a bigger target.
35
What is a Next-Generation Firewall (NGFW)?
An advanced security device that combines multiple security features for better protection, visibility, and control over network traffic. (eg PaloAlto)
36
What do packet filtering firewalls enforce?
A network access control list (ACL) to decide whether to allow, block, or log packets.
37
What do they inspect in a packet?
Source/Destination IP Protocol type (TCP, UDP, ICMP, etc.) Source/Destination ports Direction: Inbound, outbound, or both
38
*Are packet filtering firewalls stateful or stateless?
Stateless – they don’t remember previous packets or sessions.
39
What is a downside of being stateless?
Least processing Vulnerable to attacks spread across multiple packets (e.g., session hijacking)
40
What is a benefit of packet filtering firewalls?
They use minimal processing, making them fast and efficient.
41
What do stateful firewalls use to track connections?
A state table that stores connection info.
42
Which OSI layers do stateful firewalls operate at?
Layer 4 (Transport): Tracks sessions like TCP/UDP Layer 7 (Application): Validates protocols and filters traffic
43
How are stateful firewalls better than stateless ones?
They remember session info, allowing smarter and more secure traffic control.
44
What is the purpose of a Firewall Access Control List (ACL)?
To control traffic flow by allowing or denying packets based on set rules.
45
What principle do ACLs follow?
The principle of least access (or least privilege) – only allow necessary traffic.
46
Why is least access important?
It reduces the attack surface by blocking unnecessary or risky traffic.
47
What does "Single-Pass" mean in Palo Alto’s architecture?
Each packet is processed once for classification, scanning, and policy enforcement.
48
What is Parallel Processing in this architecture?
Uses dedicated hardware engines to handle different tasks simultaneously.
49
How are planes organized in this architecture?
Data plane: Handles traffic Control plane: Manages configuration & updates
50
What is the Control Plane used for?
Configuration Logging Reporting (Runs on its own CPU, RAM, and storage)
51
What is Signature Matching used for?
Detects threats by matching against: Vulnerability exploits (IPS) Viruses, spyware Sensitive data like credit card and SSN
52
What is the Security Processing function?
Uses parallel hardware to speed up complex security functions
53
What is the role of Network Processing?
Manages packet-level tasks with hardware acceleration
54
What is the core principle of Zero Trust Architecture?
Never trust, always verify — no traffic is trusted by default.
55
What traffic is inspected in Zero Trust?
Inbound traffic Outbound traffic Internal traffic (within the network)
56