2.1 Network Security Flashcards

Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements

1
Q

UTM

A

-Unified Threat Management

incorporates the functions of multiple network and security appliances into a single appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDS/IPS

A

-Intrusion Detection System/Intrusion Protection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIDS/NIPS

A
  • Network Intrusion Detection System/ Network Intrusion Prevention System
  • identifies/prevents intrusion attempts by examining network traffic, potentially looking at both the header and contents of packets being transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

INE

A
  • Inline Network Encryptor
    • Devices that encrypt sensitive information en route between sources and destinations across insecure networks like the internet and company WAN links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NAC

A
  • Network Access Control
  • Improves network security by employing policies that mandate devices meet certain security minimums before granting network access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SIEM

A
  • Security Information and Event Management

- Utilities analyze and correlate logs and events from mulitple sources as well as provide real-time alerting features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch

A

-network appliances that connect devices and workstations, servers, and printers together to form a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

-Network firewalls are devices that evaluate incoming and outgoing traffic to determine if the traffic should be allowed or denied entry across a network boundary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Controller

A
  • Network appliances or software solutions that enable administrators to centralize security configurations across multiple WAPs simultaneously
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Router

A
  • Devices that connect networks to networks in order to forward traffic based on network addresses such as IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proxy Servers

A

-Hardware or software systems that act as connection intermediaries between internal clients and Internet resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Load Balancers

A

-Devices or programs that distribute traffic across a group of similar servers known as server farm or pol, in order to increase performance and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HSM

A
  • Hardware Security Modules
  • Devices that provide key generation and safeguarding services, speed up specific cryptographic operations on platforms requiring strong authentication, and provide access control capabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MicroSD HSM

A

-Tiny HSM cards that plug into the microSD ports of smart devices such as android smart phones and tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAF

A
  • Web Application Firewalls
  • Specialize in the monitoring and filtering of unautherized and malicious traffic sent to and from web applications to provide them with protection against various internet threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passive Vulnerability Scanners

A

analyze network traffic in order to non-intrusively discover vulnerabilities with organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DAM

A
  • Database activity monitors

- monitor the transations and other activity of database services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VPN

A
  • Virtual private network
  • Offers security by tunneling data across a network through the use of technology that offers a secure means of transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPSec

A
  • Internet Port Security

- Suite of protocols for securing packets that traverse an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSL/TLS

A
  • Secure Sockets Layer is a protocol for securing communication sessions over IP networks
  • Transport Layer Security more powerful and relevant successor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SSH

A
  • Secure Shell
  • Protocol for obtaining a remote shell session with an operating system over a secured channel
  • TCP Port 22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RDP

A
  • Remote Desktop Protocol

- provides a secure, graphical, remote access connection over a network between computers using TCP port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VNC

A
  • Virtual Network Computing

- platform-independent graphical desktop sharing protocol that uses the Remote Frame Buffer (RFB) protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

VDI

A
  • Virtual Desktop Infrastructure

- Involves the hosting of a desktop OS within a virtual network environment on a centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Reverse Proxy
-Servers that provide internet devices with access to servers behind an enterprise firewall
26
802.1x
port-based network access control method that requires uers to authenticate prior to connecting to a wired or wireless network
27
Mesh Networks
-Involve all devices being directly connected to all other network devices in order to increase path redundancy and availability of the network
28
DLP
- Data Loss Prevention | - Monitors, detects, and prevents the logs of sensitive data.
29
Deep Packet Inspection
- Occurs when application-level and next-generation firewalls scan and analyze the header, state, and data portions of packets before allowing or dropping them
30
Data Flow Enforcement
-Refers to the secured and controlled flow of data within a device, between devices within a network, and across other networks.
31
Network Flow
-A sequence of packets transferred from a sending host to one or more recieving hosts.
32
S/Flow
-Method for monitoring traffic in switched and routed networks
33
Data Flow Diagrams
-graphically represent the data flow that occurs between computer systems on a network
34
Configuration Baselining
-Allows us to document what normal and acceptable levels or performance are
35
Configuration Lockdown
-Seals the configuration into our network devices to prevent unauthorized changes
36
Change monitoring
- Checks for signs of failed/successful attempts at modifying our network configuration baselines
37
Software defined networking
Centralizes the configuration and control of network devices
38
Alert Fatigue
-Occurs when administrators stop paying attention to alerts due to too many false positives
39
Transport Security
-TLS and SSL provide confidentiality and integrity for application layer protocols such as HTTP, SNMP, and SIP
40
Trunking security
- Helps mitigate various switch attacks, including switch spoofing and double-tagging attacks
41
Port Security
-Provides assurances that only approved devices are permitted to communicate on its ports
42
Route Protection
-Ensures routing table contents, transmissions, and router configurations are protected from unauthorized access and modifications
43
DDoS Protection
-Botnet attacks system that renders its services unusable
44
Remotely Triggered Black Hole
- RTBH | - Drops traffic before it gets to its destination
45
DMZ
-Perimeter networks that simultaneously protect the internal network while providing secured access to edge resources
46
Separation of Critical Assets
-Provides strongest level of isolation to the most critical assets
47
Network Segmentation
-Creates layers of security between the organization's critical or sensitive assets and the outside environment from which attacks can be launched
48
Quarantine/Remediation
-clients that are not compliant with network access control policies are quarantined into a restricted network where they seek remediation for their deficiencies
49
Persistent agent
-Resides on the client after connections are severed
50
Agent Software
-Runs on NAC clients in order to perform authentication and compliance checking prior to connecting to an organization
51
Non-persistent Agent
disappear from a client after a connection is ended
52
Agent vs Agentless
- Agents are commonly used on trusted devices that reside within or external networks - Agentless clients are common for devices that are not owned by the organization
53
SoC
- System on a chip | - Electronic devices that combine the functions of CPUs, memory, and other hardware onto a single circuit board
54
Building/home automation equipment
Centralized management systems that manage and monitor facilities and environmental technologies
55
IP Video
IP-based cameras provide video surveillance of critical areas and systems
56
HVAC controllers
Centrally controls the heating and cooling temperatures for the enterprise
57
Sensors
-Allows technologies to understand environmental measurements and when changes occur
58
Physical Access control systems
Controls access to areas using - Proximity readers - Biormetric readers - Mantraps
59
A/V systems
Audio/Video systems connected to the network pose security vulnerabilities
60
Scientific/Industrial Equipment
Devices connected to the network that pose security vulnerabilities
61
SCADA
- Supervisory Control and Data Acquisition | - Industrial control system