12 Network security Flashcards

1
Q

What is Zero Trust in network security?

A

A security model that emphasizes strict access controls and does not trust any entity by default.

It includes Control Plane components like Adaptive identity, Threat scope reduction, Policy-driven access control, and Data Plane aspects like Implicit trust zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the components of Deception and disruption technology?

A
  • Honeypot
  • Honeynet
  • Honeyfile
  • Honeytoken

These technologies are designed to deceive attackers and disrupt their activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of network attacks are commonly identified?

A
  • Distributed denial-of-service (DDoS)
  • Domain Name System (DNS) attacks
  • Wireless attacks
  • On-path attacks
  • Credential replay attacks
  • Malicious code

Each type presents unique challenges and requires specific mitigation strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of segmentation in network security?

A

To divide a network into smaller segments to enhance security and control access.

This mitigates risk by limiting the spread of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does an Access Control List (ACL) do?

A

It defines permissions for users and devices to access network resources.

ACLs are crucial for managing access controls in network environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Air-gapped network?

A

A network that is physically isolated from other networks to enhance security.

This isolation prevents unauthorized access and cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the failure modes in network security?

A
  • Fail-open
  • Fail-closed

These modes determine how a system behaves during a failure, impacting security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of a Jump server?

A

To serve as a secure access point for administrative tasks in a network.

Jump servers minimize direct access to sensitive resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Web Application Firewall (WAF)?

A

A security device that monitors and filters HTTP traffic to and from a web application.

WAFs protect against common web attacks like SQL injection and cross-site scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of firewalls mentioned?

A
  • Web application firewall (WAF)
  • Unified threat management (UTM)
  • Next-generation firewall (NGFW)
  • Layer 4/Layer 7 firewalls

Each firewall type offers different levels of protection and features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does VPN stand for?

A

Virtual Private Network.

VPNs create secure connections over untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of DNS filtering?

A

To block access to malicious domains and protect users from phishing and malware.

DNS filtering is a proactive security measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the components of Email Security?

A
  • DMARC
  • DKIM
  • SPF
  • Gateway

These protocols help authenticate emails and prevent spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DLP in the context of network security?

A

Data Loss Prevention.

DLP technologies are used to prevent sensitive data from being lost, misused, or accessed by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the significance of hardening targets?

A

To strengthen network devices against attacks by minimizing vulnerabilities.

Common targets include switches and routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: A proxy server can help in improving network security.

A

True.

Proxy servers can hide the IP addresses of users and filter traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The __________ is used to monitor network devices and can send alerts when issues arise.

A

Simple Network Management Protocol (SNMP) traps

SNMP is widely used for network management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are common indicators of malicious activity in networks?

A
  • On-path attacks
  • DNS attacks
  • Layer 2 attacks
  • DDoS
  • Credential replay attacks

Recognizing these indicators can help in early detection of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary focus of the Security+ exam?

A

Implementing designs and explaining the importance of security concepts and components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does defense-in-depth refer to in security design?

A

Multiple controls designed to ensure that a failure in a single control is unlikely to cause a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many layers are in the OSI model?

A

Seven layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Layers 1–3 of the OSI model known as?

A

Media layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do Layers 4–7 of the OSI model address?

A

Reliable data transmission, session management, encryption, and translation of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define attack surface.

A

The points at which an unauthorized user could gain access to a device or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a key concern regarding device placement in network security?

A

Securing specific zones or network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are security zones?

A

Network segments that are separate from less secure zones through logical or physical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the concept of high availability (HA)?

A

The ability of a service or system to be consistently available without downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does the term ‘fail-closed’ mean?

A

A state where no traffic passes when a security device fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fill in the blank: _______ is the idea of separating devices with no connection between them.

A

Physical isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is logical segmentation commonly implemented with?

A

Virtual local area networks (VLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does SASE stand for?

A

Secure Access Service Edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or False: Software-defined networking (SDN) allows for dynamic configuration of security zones.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the purpose of reputation services?

A

To track IP addresses, domains, and hosts that engage in malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the primary goal of network segmentation?

A

To apply controls or assist with functionality by dividing a network into logical or physical groupings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a screened subnet commonly used for?

A

To contain web servers or other Internet-facing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does the term ‘east-west’ traffic refer to?

A

Traffic flow between systems in the same security zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Fill in the blank: _______ is when a protocol is selected based on its secure version.

A

Implementing secure protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the difference between fail-open and fail-closed?

A

Fail-open allows all traffic to pass; fail-closed blocks all traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a common risk associated with using alternate ports for services?

A

Many port scans will still discover the service despite using alternate ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define high availability (HA) design considerations.

A

Focus on reliability, elimination of single points of failure, and ability to detect and remediate failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are common technologies used for network segmentation?

A
  • VLANs
  • Screened subnets (DMZs)
  • Intranets
  • Extranets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the concept of Zero Trust networks?

A

Nobody is trusted, regardless of whether they are internal or external.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the purpose of a cloud access security broker (CASB)?

A

To enforce policies for cloud resources between service providers and consumers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does SD-WAN stand for?

A

Software-defined wide area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

True or False: MPLS is commonly used in SD-WAN designs.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the role of network taps?

A

To monitor or access traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Fill in the blank: _______ is a method of providing logical segmentation using software.

A

Logical segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does the term ‘east-west’ traffic refer to in a datacenter?

A

Traffic flow between systems in the same security zone that moves left and right

This terminology describes intrasystem communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the key principle of Zero Trust architecture?

A

There is no trust boundary and no network edge; each action is validated when requested

Access is allowed only after policies are checked, including identity and security status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the components of the Control Plane in Zero Trust?

A
  • Adaptive identity
  • Threat scope reduction
  • Policy-driven access control
  • Policy Administrator

These components work together to enforce security policies and decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What role do Policy Engines play in Zero Trust?

A

They make policy decisions based on rules and external systems

They utilize a trust algorithm to determine access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Define the term ‘Policy Enforcement Point’ in the context of Zero Trust.

A

A component that communicates with Policy Administrators to manage access requests

It forwards requests from subjects and receives instructions about connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the difference between preadmission and postadmission checks in NAC?

A
  • Preadmission: Checks occur before device connects to the network
  • Postadmission: Checks occur after device is connected

Different checks are driven by security objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the primary function of Network Access Control (NAC)?

A

To determine whether a system or device should be allowed to connect to a network

NAC places devices into appropriate zones based on security checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is 802.1X used for?

A

Authenticating devices connected to wired and wireless networks

It employs centralized authentication using EAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the purpose of port security?

A

To limit the number of MAC addresses that can be used on a single port

This helps prevent MAC address spoofing and CAM table overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What does DHCP snooping do?

A

Prevents rogue DHCP servers from handing out IP addresses

It drops messages from unauthorized DHCP servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are the two major VPN technologies mentioned?

A
  • IPSec VPNs
  • SSL VPNs

IPSec operates at layer 3; SSL uses TLS and can be clientless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

True or False: A full-tunnel VPN sends all traffic through the VPN.

A

True

In contrast, split-tunnel VPNs send only specific traffic through the VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is the main advantage of agent-based NAC solutions?

A

Greater ability to determine the security state of a machine

They validate patch levels and security settings before admitting a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the role of the Policy Administrator in Zero Trust?

A

To execute decisions made by the Policy Engine

They establish or remove communication paths between subjects and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Fill in the blank: The _______ allows a subject to connect through a Policy Enforcement Point.

A

untrusted system

This connection enables trusted transactions to enterprise resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the typical use of site-to-site VPNs?

A

To extend an organization’s network and are frequently always-on VPNs.

They automatically attempt to reconnect if a failure occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

How do remote-access VPNs differ from site-to-site VPNs?

A

Remote-access VPNs are used in an as-needed mode by remote workers.

Workers activate the VPN only when connecting to specific resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is a full-tunnel VPN?

A

A VPN that sends all network traffic through the VPN tunnel.

This keeps traffic secure when using untrusted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is a split-tunnel VPN?

A

A VPN that only sends traffic intended for systems on the remote trusted network through the VPN tunnel.

It uses less bandwidth but leaves other traffic unprotected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are NAC, 802.1X, and VPN used for?

A

They all play roles in securing networks and network traffic.

Familiarity with each is important for exams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are network appliances?

A

Special-purpose hardware devices, virtual machine and cloud-based software appliances, and hybrid models.

They are used in network design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What advantages do hardware appliances offer?

A

Purpose-built for high-speed traffic handling capabilities and other specific functions.

They are typically more efficient than general-purpose devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What factors to consider when choosing a network appliance?

A

Environment, capabilities needed, existing infrastructure, upgradability, support, and cost.

Choosing a DNS appliance requires careful consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are the two types of proxy servers?

A
  • Forward proxies
  • Reverse proxies

Forward proxies anonymize client requests while reverse proxies aid in load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the purpose of jump servers?

A

To securely operate in security zones with different security levels.

They provide access with necessary administrative tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What do load balancers do?

A

Distribute traffic to multiple systems, provide redundancy, and ease upgrades and patching.

They help manage web service infrastructures.

74
Q

What are the two major modes of operation for load balancers?

A
  • Active/active
  • Active/passive

Active/active systems share load while active/passive systems activate backups when needed.

75
Q

What is persistence in load balancing?

A

Ensures that a client and a server continue to communicate throughout the duration of a session.

This provides a smoother experience for the client.

76
Q

What is the difference between Layer 4 and Layer 7 devices?

A

Layer 4 devices operate at the transport layer, while Layer 7 devices interact with application layer traffic.

This distinction impacts application security.

77
Q

What is a next-generation firewall (NGFW)?

A

A firewall that interacts with traffic at both layer 4 and layer 7, providing application awareness.

NGFWs can stop application attacks and monitor unexpected traffic.

78
Q

What are the two detection methods used by intrusion detection and prevention systems?

A
  • Signature-based detection
  • Anomaly-based detection

Signature-based relies on known patterns, while anomaly-based detects unusual behavior.

79
Q

What is the difference between inline and tap network devices?

A
  • Inline devices interact with traffic but may cause outages if they fail.
  • Tap devices replicate traffic for inspection without interrupting it.

Taps are safer but offer less interaction with traffic.

80
Q

What are stateful firewalls?

A

Firewalls that track the state of active connections and allow traffic based on the state of the conversation.

They provide more context for security decisions.

81
Q

What are unified threat management (UTM) devices?

A

Devices that include a range of capabilities such as firewall, IDS/IPS, and data loss prevention.

They are often deployed for an ‘out of the box’ solution.

82
Q

What is the purpose of web application firewalls (WAFs)?

A

To intercept, analyze, and apply rules to web traffic.

They protect against attacks targeting web applications.

83
Q

Fill in the blank: A _______ solution is used to prevent data loss from a network.

A

[data loss prevention (DLP)]

DLP solutions often pair agents with filtering capabilities.

84
Q

What is the primary function of a UTM device?

A

To provide a wide range of security functionalities and manage multiple security devices through a single interface

UTM stands for Unified Threat Management.

85
Q

What is a web application firewall (WAF)?

A

A security device designed to intercept, analyze, and apply rules to web traffic

WAFs help to block attacks in real time and can modify traffic to remove dangerous elements.

86
Q

What elements are typically included in a firewall rule?

A

Source, ports and protocols, allow/deny statement, destination IP addresses, host or hosts

Example rule: ALLOW TCP port ANY from 10.0.10.0/24 to 10.1.1.68/32 to TCP port 80.

87
Q

What is a screened subnet?

A

A network setup using three interfaces on a firewall to separate untrusted, secured, and public areas

Often referred to as a DMZ.

88
Q

Define Access Control Lists (ACLs).

A

Rules that either permit or deny actions on network devices

ACLs can be simple or complex and are similar to firewall rules.

89
Q

What is the basic format for Cisco’s IP-based ACLs?

A

access-list access-list-number dynamic name {permit|deny} [protocol] {source source-wildcard|any} {destination destination-wildcard|any}

ACLs allow for detailed control over network traffic.

90
Q

What is a honeypot?

A

A system intentionally configured to appear vulnerable for research on attacker techniques

Honeypots are monitored to document attacker actions.

91
Q

What is the purpose of honeyfiles?

A

To serve as intrusion detection by containing detectable data in areas attackers are likely to visit

If accessed, it indicates a potential breach.

92
Q

What are honeytokens?

A

Attractive data used to track unauthorized access or transfer attempts

They can be found in databases or files and help identify breaches.

93
Q

What is the role of Domain Name System Security Extensions (DNSSEC)?

A

To provide authentication of DNS data to validate queries

DNSSEC helps close security gaps in the DNS protocol.

94
Q

What are the three major methods of email protection outlined in the Security+ exam?

A
  • DKIM
  • SPF
  • DMARC

Each method has a specific role in verifying email authenticity.

95
Q

What does DKIM do?

A

Adds a signature to emails to verify they are from the claimed domain

It helps ensure message integrity.

96
Q

What is SPF in email security?

A

An authentication technique that publishes a list of authorized email servers

SPF records help prevent spoofing.

97
Q

What does DMARC stand for?

A

Domain-based Message Authentication Reporting and Conformance

DMARC uses SPF and DKIM to validate email authenticity.

98
Q

What is the key concept of ephemeral keys in TLS?

A

Each connection receives a unique, temporary key to ensure perfect forward secrecy

This protects past and future communications even if a key is compromised.

99
Q

What is the Simple Network Management Protocol (SNMP) used for?

A

To monitor and manage network devices

SNMP uses a management information base (MIB) for device information.

100
Q

What is an SNMP trap?

A

A message sent from an SNMP agent to a manager to notify of an error or event

Traps allow for proactive management of network devices.

101
Q

What is the significance of monitoring services and systems?

A

Ensures that organizational services are online and functioning as expected

Monitoring is crucial for maintaining service availability.

102
Q

What is the primary function of monitoring services and systems?

A

To ensure that an organization’s services are online and accessible

Monitoring includes checking service responses and validating service functionality.

103
Q

What is the simplest level of service monitoring?

A

Validating whether a service port is open and responding

This basic functionality helps identify significant issues like service failures.

104
Q

What does the next level of monitoring require?

A

Interaction with the service and understanding of valid responses

This includes validating performance and response times.

105
Q

What does the final level of monitoring systems look for?

A

Indicators of likely failure

It uses a broad range of data to identify pending problems.

106
Q

Where are service monitoring tools commonly integrated?

A

Operations monitoring tools, SIEM devices, and organizational management platforms

These tools help provide insight into ongoing issues for security administrators.

107
Q

What is the role of a file integrity monitor?

A

To detect changes in configuration files and restore them to normal

It reports on unexpected changes in the system.

108
Q

What is a well-known file integrity monitoring tool?

A

Tripwire

Tripwire has both commercial and open-source versions.

109
Q

How do file integrity monitoring tools like Tripwire work?

A

They create a signature or fingerprint for a file and monitor for changes

They focus on unexpected and unintended changes.

110
Q

What is a key challenge when using file integrity monitors?

A

They can be noisy and require careful setup and maintenance

Files change frequently, making monitoring complex.

111
Q

What is meant by hardening network devices?

A

Securing them to keep them safe from attacks

Hardening guidelines exist for many device operating systems.

112
Q

Who provides hardening guidelines for network devices?

A

The Center for Internet Security (CIS) and device manufacturers

These guidelines help follow industry best practices.

113
Q

What is an important step in hardening network devices?

A

Protecting their management console

This often involves using isolated VLANs and access via jump servers or VPN.

114
Q

Why is physical security critical for network devices?

A

To secure network closets and monitor access

Electronic access mechanisms help track who accesses secured spaces.

115
Q

True or False: Securing the services a network provides is not important for the Security+ exam.

A

False

It is a key element in the exam outline.

116
Q

Fill in the blank: File integrity monitoring helps to track _______.

A

[changes]

It is essential for maintaining system integrity.

117
Q

What is the primary purpose of secure protocols in network security?

A

To ensure that a system or network breach does not result in additional exposure of network traffic.

Secure protocols are essential in a defense-in-depth strategy.

118
Q

Which secure version of the Session Initiation Protocol is used for secure voice and video communications?

A

SIPS

SIPS is the secure version of SIP.

119
Q

What is the secure version of the Network Time Protocol called?

A

NTS

NTS relies on TLS for authentication.

120
Q

Name three secure protocols used for email communication.

A
  • IMAPS
  • POPS
  • S/MIME

These protocols ensure secure email retrieval and transmission.

121
Q

What has largely replaced File Transfer Protocol (FTP)?

A
  • HTTPS file transfers
  • SFTP
  • FTPS

The choice depends on organizational preferences.

122
Q

What does LDAPS stand for?

A

Lightweight Directory Access Protocol Secure

LDAPS is the secure version of LDAP.

123
Q

Which protocol is used for secure remote shell access?

A

SSH

SSH has replaced telnet for secure remote access.

124
Q

True or False: DNSSEC provides confidentiality for DNS information.

A

False

DNSSEC focuses on ensuring that DNS information is not modified but does not provide confidentiality.

125
Q

What does SNMPv3 improve upon compared to previous versions?

A

Authentication, message integrity validation, and confidentiality via encryption.

Only the authPriv level uses encryption.

126
Q

Fill in the blank: Hypertext Transfer Protocol over SSL/TLS is commonly referred to as _______.

A

HTTPS

HTTPS relies on TLS for security.

127
Q

What is the secure version of the Real-Time Protocol called?

A

SRTP

SRTP provides security for audio and video streams.

128
Q

What does S/MIME provide for email messages?

A

Encryption and signing of MIME data

It ensures authentication, integrity, nonrepudiation, and confidentiality.

129
Q

What is the main function of IPSec?

A

To encrypt and authenticate IP traffic.

IPSec is a suite of security protocols.

130
Q

What are the two main components of IPSec that focus on security?

A
  • Authentication Header (AH)
  • Encapsulating Security Payload (ESP)

AH ensures data integrity, while ESP provides encryption.

131
Q

What does ISAKMP define in relation to IPSec?

A

How to authenticate the system and manage security associations.

ISAKMP is crucial for key exchange and authentication.

132
Q

What is the original port for HTTP?

A

TCP 80

The secure version, HTTPS, uses TCP 443.

133
Q

List two protocols used for secure email authentication.

A
  • DKIM
  • DMARC

These protocols help improve email security and reduce spam.

134
Q

Fill in the blank: The secure version of FTP that uses TLS is called _______.

A

FTPS

FTPS can operate in explicit or implicit mode.

135
Q

What is the main advantage of SFTP over FTPS?

A

Easier to get through firewalls

SFTP uses only the SSH port.

136
Q

Which protocol is used to secure VPN connections?

A

IPSec

IPSec is often used in tunnel mode for VPNs.

137
Q

What is an on-path attack also known as?

A

Man-in-the-middle (MitM) attack

An on-path attack involves relaying traffic through a system controlled by an attacker.

138
Q

What can an attacker do during an on-path attack?

A

Eavesdrop or alter communications

This allows attackers to read and modify data being transmitted.

139
Q

What is SSL stripping?

A

An attack that removes TLS encryption to read traffic intended for a trusted endpoint

SSL stripping takes advantage of the transition from HTTP to HTTPS.

140
Q

What are the three phases of an SSL stripping attack?

A
  • User sends an HTTP request
  • Server responds with a redirect to HTTPS
  • User sends an HTTPS request for the page

Each phase is critical for the success of the attack.

141
Q

How can you stop SSL stripping attacks?

A
  • Configure systems to expect certificates from known authorities
  • Use HTTP Strict Transport Security (HSTS)
  • Require HTTPS throughout the site
  • Use browser plug-ins like HTTPS Everywhere

These strategies help mitigate the risk of SSL stripping.

142
Q

What is a browser-based on-path attack?

A

An attack relying on a Trojan inserted into a user’s browser

This type of attack can bypass TLS encryption and access authenticated sessions.

143
Q

What are common indicators of on-path attacks?

A

Changed network gateways or routes

Sophisticated attackers may compromise network switches or routers.

144
Q

What is domain hijacking?

A

Changing the registration of a domain to intercept traffic

This can be done through technical means or social engineering.

145
Q

What is DNS poisoning?

A

Providing false DNS responses to redirect traffic

This can involve pretending to be an authoritative DNS server.

146
Q

What does DNSSEC do?

A

Validates the origin of DNS information and ensures responses are unmodified

This helps prevent DNS attacks like DNS poisoning.

147
Q

What is URL redirection in the context of DNS attacks?

A

Inserting alternate IP addresses into a system’s hosts file

This can mislead systems during DNS lookups.

148
Q

What are credential replay attacks?

A

Capturing and re-sending valid network data

Most commonly, this involves re-sending authentication hashes.

149
Q

What is a common indicator of replay attacks?

A

On-path attack indicators like modified gateways or routes

These changes can signify an ongoing replay attack.

150
Q

What are common examples of malicious code?

A
  • Worms
  • Backdoors
  • Viruses
  • Trojans
  • Ransomware

These can spread via network connections.

151
Q

What is a distributed denial-of-service (DDoS) attack?

A

An attack conducted from multiple locations, networks, or systems

DDoS attacks are difficult to stop and hard to detect.

152
Q

What are the two major categories of network DDoS attacks?

A
  • Volume-based
  • Protocol-based

Each category targets different aspects of network traffic.

153
Q

What is a UDP flood?

A

A volume-based DDoS attack that sends massive amounts of UDP traffic

UDP floods exploit the lack of a handshake protocol.

154
Q

What is a SYN flood?

A

A protocol-based DDoS attack that sends SYN packets without completing the handshake

This consumes TCP stack resources on the target.

155
Q

What is an amplified denial-of-service attack?

A

An attack that uses small queries to generate large responses from legitimate services

This type of attack amplifies the amount of traffic directed at the target.

156
Q

What is a reflected denial-of-service attack?

A

An attack where the spoofed IP address causes a legitimate service to conduct the attack

This makes it difficult to identify the actual attacker.

157
Q

What is the final element to know for the exam regarding network attacks?

A

Familiarity with secure protocols and common network attacks

Understanding how to identify, prevent, and respond to these attacks is crucial.

158
Q

What must security professionals understand about secure networks?

A

How secure networks are designed

This includes infrastructure considerations, connectivity requirements, and security zones.

159
Q

What factors are included in infrastructure considerations for security professionals?

A

The organization’s attack surface, device placement, and security zones

These factors help in establishing a secure network design.

160
Q

What connectivity requirements need to be accounted for in network design?

A

Speed and latency

Additionally, failure modes need to be determined for devices.

161
Q

What are the two types of failure modes for devices in a secure network?

A
  • Fail open to maintain access
  • Fail closed to ensure security
162
Q

What concepts help create barriers to attacks and exploits?

A
  • Physical isolation
  • Air-gapping
  • Logical segmentation
163
Q

What do high-availability design concepts ensure?

A

Systems remain online despite issues or disasters

164
Q

What is the purpose of secure protocols in network security?

A

To keep data secure in transit

165
Q

What is a characteristic of software-defined networks?

A

They rely on the ability to be controlled by software

166
Q

What do SD-WANs manage?

A

Connectivity outside of the local organization

167
Q

What does SASE help protect?

A

Devices regardless of their location

168
Q

What model does zero trust concepts promote?

A

A continuous validation and authorization model

169
Q

What technologies help control access to networks?

A
  • Network access control (NAC)
  • 802.1X
  • Port security
170
Q

What do VPNs provide?

A

Secure remote access and protect organizational data in transit

171
Q

What are security tools often available as?

A

Security appliances and devices

172
Q

What is the function of secure access via jump boxes?

A

Allows administrators to safely cross security boundaries

173
Q

Name three network capabilities provided by load balancers, proxy servers, and web filters.

A
  • Load balancing
  • Proxy services
  • Web filtering
174
Q

What security functionalities do firewalls, IDS, IPS devices, and DLP tools provide?

A

Focused security functionality

175
Q

What should be included in security and device management design options?

A
  • Out-of-band management techniques
  • Access control lists
  • Quality-of-service functionality
  • Routing protocol security options
  • DNS security configurations
  • Broad use of TLS and TLS-enabled services
  • SNMP and monitoring tools
  • Honeynets and honeypots
176
Q

What is important about using secure protocols and services?

A

Understanding limitations and implementation requirements

177
Q

What happens once attackers are in a network?

A

They will attempt to gain access to network traffic

178
Q

What options are part of the secure network design toolkit?

A
  • Secure email
  • Secure FTP
  • Secure HTTP
  • Secure Shell
179
Q

What types of attacks need to be identified in network security?

A
  • On-path attacks
  • DNS attacks
  • Credential replay
  • Distributed denial-of-service attacks
180
Q

What do identifiable characteristics of attacks include?

A

Traffic patterns and switch behavior