3.2 Flashcards

1
Q

Failure modes

A

Determines how a device or system behaves when it encounters a failure or malfunction, making them a valuable component of various engineering and safety systems 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fail-closed

A

The security system defaults to a closed door block state when it encounters a problem or malfunction and it is one of two options.
Ensures that even during system failures, the network remains secure 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fail-open

A

A security system defaults to an open state when it encounters an issue or failure.
This creates a significant security vulnerability as they permit unrestricted access 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

two types of attack surface categories

A

digital and physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack surface

A

consists of all possible attack
vectors that a threat actor can use to access a system and extract data
* It represents the targets of the cyber kill chain
* The smaller the attack surface, the easier it is to counter with various controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intrusion prevention system (IPS)

A

a
network security hardware or software solution
that continuously monitors a zone for malicious activity
* It then proactively takes action to prevent it in the line of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

intrusion detection system (IDS)

A

which reactively detects malicious
activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPS actions

A
  • Alerts and alarms
  • Verbose dumps
  • Transmission Control Protocol (TCP) resets
  • Drop packets or addresses
  • Blocking (shun) on firewalls and routers
  • Simple Network Management Protocol (SNMP)
    traps
  • Logging to Syslog and security information and
    event management (SIEM) systems
  • Flows to NetFlow collectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zoning

A

a logical design approach used to mitigate the risk of an open network by segmenting
infrastructure services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Each zone has fundamental characteristics, defined
by the security policy:

A
  • Every zone contains one or more separate, routable
    networks
  • Every separate, routable network is contained within a single zone
  • Every zone connects to another zone via a perimeter that contains zone interface points (ZIPs)
  • The only zone that may connect to the public zone is the public access zone (PAZ), or DMZ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1X Port-Based network access control (PNAC)

A

involves making sure something interfacing with
the system is what it claims to be

When someone wants to gain access to an Ethernet
or 802.11 wireless network, it verifies the entity
connecting is who they say they are in flexible ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1X Port-Based network access control (PNAC) capabilities

A

-Pre-admission control to block
unauthenticated messages
-Conduct both authentication and
authorization
-Onboarding and provisioning devices in a Zero Trust environment
-Supporting attribute-based access control (ABAC)
- identify users and devices with predefined credentials or machine ID’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extensible Authentication Protocol (EAP)

A

an authentication framework as opposed to a specific authentication mechanism

It has evolved over the years from the original Point-to-Point Protocol (PPP)
* It is often used in 802.1X wireless networks and point-to-point connections
* It offers some basic functions and negotiation of authentication methods called EAP methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

next-gen firewalls

A

a metaphor representing software
and/or hardware controls that can limit the damage spreading from one subnet, virtual local area
network (VLAN), zone, or domain to another

  • It is typically deployed as a barrier (zone interface
    point) between an internal (trusted) network and an
    external (untrusted) network
  • They are integrated systems of threat defense
    functioning at layers 2-7 and can be categorized as
    network or application firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

unified threat management (UTM)

A

can provide malware inspection, DLP, content filtering, and URL filtering

It can protect email, webmail, fax, voice, conferencing, streaming, peer-to-peer file transfer
services, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web application firewall (WAF)

A

a web security gateway (WSG), it is usually an appliance (physical or virtual), server plugin, or
virtual firewall running in a hypervisor or cloud
deployment

  • It protects HTTP and HTTPS (TLS) traffic at layers 5
    through 7 of the OSI reference model
    -Typically, these rules cover common web attacks, such
    as cross-site scripting (XSS), request forgeries, and SQL
    injection
17
Q

Transportation layer security (TLS)

A

uses certificates for authentication ensuring a firm handshake of security.
encrypted tunnel is created and the authentication is sent to a RADIUS server.
authentication and connection solidified, VPN has gateway that provides secure communication for local network

18
Q

Software-defined wide area network (SD-WAN)

A

a
software-defined networking (SDN) approach that raises network traffic management away from the
hardware and premises to next-generation software in the cloud for superior agility, control, and visibility

-incorporates a centralized control function with user-defined application and routing policies to
deliver highly secure, robust, application-aware network traffic management

19
Q

Secure access service edge (SASE)

A

blends security with cloud agility, offering centralized end-to-end protection and simplified access regardless of location

SD-WAN and cloud native security functions such as secure web
gateways, cloud access security brokers, firewall asa-service, and zero-trust network access (ZTNA)

20
Q

Internet Protocol Security (IPSec)

A

can be used to create a secure session between a client computer and a server