3.3 secure network designs Flashcards

1
Q

screened subnet

A

aka DMZ

a network architecture that uses a single firewall with three network interfaces.

Interface 1 is the public interface connected to the internet
Interface 2 connects to the demilitarized zone (DMZ)
Interface 3 connects to the intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

extranet

A

private network that allows organizations to share information and applications with third parties. Third parties may include: Suppliers, Partners, Customers, Other businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

concentrator

A

encryption and decryption in a device
usually in the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

L2TP

A

Layer 2 tunneling protocol

a computer networking protocol that creates a connection between a device and a VPN server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BPDU guard

A

SPANNING TREE PROTECTION

bridge protocol data unit guard

a security feature that protects the Spanning Tree domain from external influence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAT gateway

A

network address translation

It’s a process that maps multiple private IP addresses to a single public IP address. This is done by changing the header of IP packets while they’re in transit through a router.

NAT can help improve security, privacy, and network performance. It can also reduce the number of IP addresses an organization needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FIM

A

file integrity monitoring

tests and checks operating system (OS), database, and application software files to determine whether have been tampered with or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network based firewall

A

filter traffic by port number or app
encrypt traffic
layer 3 device
NAT functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

stateless firewall

A

Stateless firewalls protect networks based on static information like the source and destination.

doesn’t understand traffic flows, rule based, relies on ACL

clunky, outdated technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stateful firewall

A

network-based firewall that monitors the state of active network connections. It also analyzes incoming traffic for potential risks.

most are stateful, secure, and intelligent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UTM

A

universal threat management
all-in-one security appliance

A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Some units also provide services such as remote routing, network address translation (NAT), and virtual private network (VPN) support. The allure of the solution is based on simplicity, so organizations that may have had individual vendors or appliances for each separate security task can now have them all under one vendor umbrella, supported by one IT team or segment, and run through one console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAF

A

web application firewall
applies to PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

proxies

A

a server application that acts as an intermediary between a client and a server. Proxies can be software or hardware.
- access control
- url filtering
- content scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

jump server

A

A jump server creates a barrier between networks, which provides an extra layer of security against outsiders who may want to access sensitive company data.

Increase security: Create a barrier between networks and separate the user workstation from network assets

Reduce exposure: Minimize direct connections to internal resources, reducing the risk of security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HSM

A

hardware security module

safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions

can be an appliance for multiple endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

load balancing persistence

A

a load balancing function that routes connections to the same device. This technique is also known as “sticky sessions”.

17
Q

NAC

A

Network Access Control (NAC) is a security method that uses protocols and policies to restrict access to a private network. NAC also unifies endpoint security technology, user authentication, and network security enforcement.

Agent-based NAC
Requires software agents to be installed on endpoints
Assesses security posture and controls access through policy enforcement
Works best for simple workloads with standard configurations and operating systems

Agentless NAC
Doesn’t require software installations on endpoint devices
Relies on device and user behaviors to trigger enforcement decisions
Ideal for complex, large-scale environments

18
Q

Out-of-band management

A

a method for remotely controlling and managing network equipment and critical IT assets. It uses a secure protocol connection through a secondary interface that is separate from the primary network connection.

19
Q

NIDS

A

Network Intrusion Detection System

inline - Inline sensors are placed directly in the data path, between the source and destination. They can take immediate action, such as blocking traffic, when an attack is detected.

passive - only monitor network traffic to detect and alert about security threats. A passive IDS that detected malicious activity would generate alert or log entries but would not take action.

20
Q

NIPS

A

Network Intrusion Prevention System

21
Q

ACL

A

access control list

installed in routers or swithes

table of a set of rules that specify which users or systems have access to a resource.

22
Q

QoS

A

Quality of Service

a set of technologies that manage network traffic and ensure the performance of critical applications. QoS can also refer to the overall performance of a service, such as a computer network, cloud computing service, or telephony.