12 Network security Flashcards
What is the foundation of network security?
A secure design
Networks must be designed with security in mind, considering the attack surface and segmentation.
What does NAC stand for in network security?
Network Access Control
NAC and 802.1X protect networks from untrusted devices.
What are some methods to prevent network issues from malicious or misconfigured systems?
- Port security
- Loop prevention
- Broadcast storm protection
What is the purpose of network taps?
Allow packet capture by creating a copy of traffic from other ports.
What is a VPN used for?
To tunnel network traffic to another location.
Fill in the blank: Secure network design includes concepts like _______.
[key learning term]
Examples include physical isolation, logical segmentation, and secure protocols.
What is the function of jump servers?
Provide a secure way to access systems in another security zone.
What are load balancers used for?
Spread load among systems.
True or False: Proxy servers centralize connections from a group of clients to a server.
True
What do web filters do?
Filter content and URLs based on rules.
What is the role of data loss prevention systems?
Monitor to ensure that sensitive data is identified and flagged.
What do IDS and IPS devices do?
Identify and take action based on malicious behavior.
What types of firewalls are mentioned?
- Next-generation firewalls
- Web application firewalls
- Unified threat management appliances
What is the purpose of access control lists?
Determine what traffic can flow through devices based on rules.
What is out-of-band management?
Management interfaces on a separate VLAN or physical network.
What does DNSSEC do?
Helps validate DNS servers and responses.
What protocols are leveraged for email security?
- DMARC
- DKIM
- SPF
What is the function of TLS in network security?
Protect network traffic.
What do file integrity monitors check?
If files have been changed.
What are honeypots and honeynets used for?
Gather information about attackers.
What is the significance of secure protocols?
Provide ways to send and receive information securely.
What are some key secure protocols mentioned?
- SRTP
- IMAPS
- POPS
- LDAPS
Fill in the blank: On-path attacks _______ traffic through a system controlled by an attacker.
[key learning term]
What are examples of DNS attacks?
- Domain hijacking
- DNS poisoning
- URL redirection
What do credential replay attacks exploit?
Poorly designed or insecure protocols.
What do denial-of-service attacks aim to do?
Consume resources or target services to cause them to fail.
True or False: Reflected denial-of-service attacks use spoofed source addresses.
True
What is the difference between reflected and amplified denial-of-service attacks?
Reflected uses spoofed addresses; amplified uses small queries for large results.