(1)Segmentation of Networks Flashcards

1
Q

Firewalls use network segmentation. What is Network segmentation?

Describe how zones of trust factor into network segmentation in the context of firewalls

A

Network Segmentation is where networks are isolated from one another (but still able to reach each other) based on their assigned security level.

In the context of firewalls, network segmentation can be taken farther by creating different zones of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When it comes to network segmentation, what is a jump box?

Provide an example of where a jump box could be used

A

A jump box is a server that is implemented within a screened subnet.

Imagine you had a server that you wanted to make sure no one else could access. In this case, what a jump box would be useful for is to be a safe transition point from the corporate network to the server.

It would be between the server that houses sensitive data and another system, such as one that is trying to connect to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you had a server that had secure info on it and put a jump box between it and any system that may try to connect to it, what protocols could a system admin use to connect to it remotely?

How should jump box connections be secured?

A

A system admin could use Secure Shell (SSH) or Remote Desktop Protocol (RDP) to connect to the jump box.

Jump box connections should be firmly guarded with multifactor authentication (MFA) tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does an administrator use a jump box to connect to a secure server?

A

The admin first needs to authenticate to the jump box, and then they can connect to the secure server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can jump boxes be useful when allowing contractors or other non employees to connect to one’s network?

A

Third party entities such as contractors could be required to authenticate to a jump box before being able to access the corporate network, and even then they should only be allowed access to systems that they actually need to use to conduct their approved business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly