3.2 Implement secure network architecture concepts Flashcards

1
Q

Zones/topologies

A

A network specification that determines the network’s overall layout, signaling, and dataflow patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DMZ

A

(Demilitarized Zone) A small section of a private network that is located behind one firewall or between two firewalls and made available for public access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Extranet

A

A private network that provides some access to outside parties, particularly vendors, partners, and select customers.

ex. Sharepoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intranet

A

A private network that is only accessible by the organization’s own personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Honeynets

A

An entire dummy network used to lure attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAT

A

(Network Address Translation) A simple form of Internet security that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ad hoc network

A

A type of wireless network where connected devices communicate directly with each other instead of over an established medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Segregation/segmentation

A

A situation where hosts on one network segment are prevented from or restricted in communicating with hosts on other segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logical (VLAN)

A

(Virtual local are network) A logically separate network, created by using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtualization

A

The process of creating a simulation of computing environment, where the virtualized system can simulate the hardware, operating system, and applications of a typical computer without being a separate physical computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Air Gaps

A

A type of network isolation that physically separates a network from all other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tunneling/VPN

A

The practice of encapsulating data from one protocol for safe transfer over another network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site-to-site VPN

A

Connects two or more local networks, each of which runs a VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote access

A

A server configured to process remote connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collectors

A

SIEM software features that store and interpret logs from different types of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Proxies

A

A device that acts on behalf of one end of a network connection when communicating with the other end of the connection.

17
Q

Firewalls

A

A software or hardware device that protects a system or network by blocking unwanted network traffic.

18
Q

VPN concentrators

A

A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels.

19
Q

SSL/TLS accelerators

A

A hardware device with a SPECIALIST CHIPSET dedicated to public key encryption calculations.

20
Q

Load balancers

A

A type of switch or router that distributes client requests between different resources, such as communications links or similarly configured servers. This provides fault tolerance and improves throughput.

21
Q

DDoS mitigator

A

Counteracting a DDoS attack with the following techniques: Clustering services, Blackhole, Sinkhole routing

22
Q

Aggregation switches

A

Similar to a Layer 3 switch (which keeps traffic moving between VLANs). Used for large enterprise or service providers.

23
Q

Taps and port mirror

A

A powered device that copies network traffic and identifies malicious traffic.

24
Q

SDN

A

(Software Defined Networking) A software application for defining policy decision on the control plane.