3.3 Secure Network Designs Flashcards

1
Q

Define East-West traffic

A

Network communication between devices in same data center or LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define North-South traffic

A

Network communication between local devices and WAN or extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define concept of zero-trust

A

Often internal network communication is less protected external communication. Zero-trust is placing the same authentication, encryption, etc policies that would be used for in-bound external network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define VPN concentrator

A

Device that handles encrypting/decrypting VPN traffic, can be a stand-alone device or often integrated into another device like a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define SSL VPN and 3 advantages of using it

A
  1. VPN that uses SSL and port 443 since it is commonly an open port
  2. VPN connectivity is always-on when the computer is started
  3. Simple to implement and manage, doesn’t require digital certs
  4. Often user can connect with just a password, multi-factor auth for more security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define HTML5 for VPN

A

HTML5 can be used to implement SSL VPN connectivity by simply opening the browser
*browser must support HTML5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Distinguish between full & split tunnel VPN

A

Full-tunnel VPN: all traffic goes through the VPN concentrator first
Split-tunnel VPN: can designate some traffic to use VPN and others not, i.e. corporate network access goes through VPN, but web browsing traffic does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does IPSec provide? (3)

A
  1. Encryption/Confidentiality
  2. Authentication
  3. Anti-replay protection via digitally signed packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define L2TP

A

Layer 2 Tunneling Protocol - connects 2 networks together as though they are a single network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 ways to secure DNS

A
  1. DNSSEC - requires PKI
    2.DNS sinkhole
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define NAC (3)

A
  1. Network Access Control
  2. Screens devices to determine if they should be allowed to the network or not, often allows to devices to connect to a limited network for remediation (quarantine)
  3. Agent-based or agentless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Agent-based NAC (2)

A
  1. Software that is installed on devices to perform NAC verification
  2. Can be persistent or dissolvable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define persistent and dissolvable agent-based NAC

A
  1. Persistent - permanently installed on the device
  2. Dissolvable - downloads to device upon connection and then is terminated after running
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of persistent agent-based NAC

A

Has to be maintained and updated on every device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define agentless NAC

A

Often integrated into the OS and runs automatically when system accesses network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantage of agentless NAC

A

Inability to schedule regular health checks or scans for device compliance

17
Q

Define out-of-band management

A

Creation of a separate network, often with remote access, to manage infrastructure devices

18
Q

Broadcast storm what protocol is vulnerable to this and how to mitigate/prevent it

A
  1. IPv4 is vulnerable to this, IPv6 uses multicast instead
  2. Can use VLANs/network segmentation
  3. Managed switches allowing setting limits for broadcast traffic
19
Q

Define BPDU guard

A
  1. BDPU is Protocol used by Spanning Tree Protocol (STP) to prevent loops
  2. Configured at the switch port level to monitor for BPDU packet transmissions from plugged in device and disables the port if BPDU is detected
20
Q

Define DHCP snooping

A

Layer 2 security integrated into switches to block rogue DHCP servers

21
Q

Other than DHCP snooping, how to prevent rogue DHCP servers

A

Configuring switch ports as untrusted blocks DHCP traffic

22
Q

Define MAC filtering (2)

A
  1. Only allowing devices with known MAC addresses to be connected to the network
  2. Not the best security because valid MAC addresses can be easily collected and then a device can spoof its MAC address
23
Q

Define jump server

A

A single device that is hardened and used only to provide external VPN/SSH access in order to allow management of other internal network devices

24
Q

Define forward proxy

A

Used to control internal access to the Internet

25
Q

Define reverse proxy

A

Used to filter external access to internal resources

26
Q

3 common uses of proxy servers

A
  1. Caching
  2. Authentication to control Internet access
  3. URL Filtering/Content scanning
27
Q

Define NIDS/NIPS and 2 implementation methods

A
  1. Network-based Intrusion Detection/Prevention System
  2. Can be placed inline to actively review all network traffic and block malicious traffic
  3. Can be placed on a switch port that mirrors network traffic to it for passive monitoring and then alert admins upon malicious detections
28
Q

Signature based detection in NIDS/NIPS

A

Identifies malicious traffic based on exact matches to known signatures

29
Q

Heuristic/Behavior based detection in NIDS/NIPS

A

Identifies malicious traffic based on what it is trying to do

30
Q

Anomaly based detection in NIDS/NIPS

A

Learns what normal network traffic is and then takes action upon detection of anomalies from this

31
Q

Example of Hardware Security Module (HSM)

A

TPM

32
Q

Define stateless firewall (3)

A
  1. Can only allow/block traffic based on source/destination IP address, port #, TCP/UDP
  2. To allow full request/response, 2 rules must be defined
  3. Not very common
33
Q

Define stateful firewall

A
  1. Extends stateless firewall by adding intelligence about sessions
  2. i.e. only 1 rule needs to be added to deny/allow requests, the response will be allowed since the request initiated a session
  3. Most common firewall
34
Q

Define UTM

A
  1. Unified Threat Management
  2. A device that combines a combination of security functions, such as firewall, routing, VPN, IDS/IPS, into a single devices
35
Q

Define Web Application Firewall (WAF) (2)

A
  1. A firewall designed specifically to secure HTTP/HTTPS communications to a web server
  2. Can monitor input and detect SQL Injection for example
36
Q

Define Sensors & Collectors (2)

A
  1. Sensor collects information, such as logs, from a device and forwards it to a collector for analysis
  2. SIEM is an example of a collector