3.3 Implement Secure Network Designs Flashcards

1
Q

Previously known as the DMZ, and allows public access to resources without access to internal network.

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A private network for partners like vendors and suppliers

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Holistic approach to network security that involves ensuring all devices, processes, and people are verified/nothing is trusted.

A

Zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN that uses TLS protocols and doesn’t require a VPN client. Usually ran from a browser.

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN that provides on-demand access. Software connects to a VPN concentrator via a tunnel.

A

Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN type: traffic is encrypted through local concentrator and decrypted on the concentrator on the other side of the tunnel. Generally from firewall/concentrator to firewall/concentrator.

A

Site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN type: Remote user connects to a VPN concentrator and all traffic must pass through the concentrator before being sent out to 3rd party sites.

A

Full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when a load balancer provides a preference connection to a specific server based off of a session ID?

A

Affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What major support is provided by HTML5 that allows use of SSL VPNs without installing a client?

A

API support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPN type: Administrator can determine which traffic is allowed through the tunnel and what traffic can be transmitted over the public internet.

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protocol used to connect sites over IP as if they were connected over layer 2. Commonly implemented with IPSec

A

Layer 2 tunneling protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two main security features does IPSec provide?

A

encryption

packet signing (anti-replay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two main IPSec protocols?

A

Authentication Header (AH)

Encapsulation Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What portion of a packet remains in the clear when sending IP packets via transport mode?

A

IP Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: When sending IP packets via tunnel mode, the IP Header is not encrypted.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authentication header does not provide encryption, but rather what aspect of the data? (By using a hash and shared key)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false: ESP provides authentication as well as encryption of IP packets?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What device can be used to control broadcast messages to prevent broadcast storms?

19
Q

What standard was developed to prevent loops?

A

Spanning tree protocol (802.1D)

20
Q

Process of a switch adding untrusted DHCP devices to a untrusted list.

A

DHCP Snooping

21
Q

Adds ability to authenticate responses when it comes to domain requests.

22
Q

What is it called when a DNS server redirects a user to a safe location when they are attempting to access a known malicious address?

A

DNS sinkhole

23
Q

What is a console router or comm server?

A

A centralized router that can connect you to all other network devices on the network

24
Q

What unique challenge is faced when it comes to security with IPv6?

A

difficult to IP/port scan

25
A physical device that can be placed in the middle of a network transmission in order to capture traffic transmitted between the two devices.
Tap Port mirror (software based)
26
A location staffed with cybersecurity experts who are constantly monitoring for security risks and vulnerabilities.
Security operations Center (SoC)
27
Monitoring that verifies files and alerts you when changes are made.
File integrity monitoring (FIM)
28
Firewall that does not keep track of traffic flows.
Stateless firewall
29
A device that includes a firewall along with many other features such as URL filtering, malware inspection, spam filters, routing, IDS/IPS, etc.
unified threat management (UTM) device
30
A firewall that can evaluate all traffic at all layers of the OSI model.
Next generation firewall (NGFW)
31
A firewall build specifically for applications using HTTP/HTTPS traffic.
Web application firewall (WAF)
32
Used on many high-end websites, and are a requirement for websites that take credit card payment info through PCI DSS compliance.
WAF (web application firewall)
33
How does edge control and access control vary?
Access control involves control from anywhere on the network, not just on the edge
34
An assessment performed when a device is brought onto a network via BYOD policies.
Posture assessment
35
Device that sits between users and the rest of the network.
Proxy server
36
Type of proxy used to control internal access to the internet.
Forward proxy
37
A proxy used to direct external traffic towards internal resources.
Reverse proxy
38
IPS monitoring that logs and analyzes traffic, but cannot block malicious traffic.
Passive monitoring
39
IPS monitoring that captures and analyzes packets before the traffic is able to reach the endpoint.
Inline monitoring
40
What are the main ways for an IPS to identify malicious traffic?
Signature Anomaly Behavior Heuristics (AI and big data)
41
A server that allows you to make connections to various internal devices from the outside via a secure tunnel.
Jump server
42
Device used to control your crypto keys and manages cryptography across entire organization.
Hardware security module (HSM)
43