5.2 Network Security Flashcards

1
Q

Computer networks enable __________ ________ and are essential for many daily activities and devices. Network threats can come from attackers, __________, or ________.

A

resource sharing;
misconfigurations; outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can networks be protected? (two ways)

A

secure design (e.g. segmentation, choke points, redundancies) and implementing devices like firewalls and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network segmentation divides networks into _________, allowing traffic control between segments and localizing issues.

A

subnets;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It can boost performance and prevent unauthorized access to sensitive areas.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Choke points are what? ( 3 things) _____________ in network design can help mitigate issues from failures or attacks.

A

Locations where network traffic can be inspected, filtered and controlled.
Redundancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____________ control traffic flow in and out of networks, typically placed at trust boundary points. They examine _______ ________ to allow or disallow traffic based on various factors.

A

Firewalls;
network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ ________ _________s look at individual packet contents to allow/disallow based on source/destination addresses, port numbers, and protocols. This method can be vulnerable to _________________.

A

Packet filtering firewalls;
attacks spanning multiple packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What mechanism tracks traffic at a more granular level, monitoring connections over time. They can prevent some intentionally disruptive attack traffic.

A

Stateful packet inspection firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deep packet inspection firewalls can analyze ________________________, providing more intelligence but also raising____________________.

A

the actual content of network traffic;
privacy concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proxy servers are _________ _________ ________ that provide security and performance features. They can act as _________ _________and allow traffic logging.

A

APPLICATION-specific firewalls; choke points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________________________uses multiple firewall layers to separate devices from the rest of the network, allowing controlled public access while protecting internal systems.

A

A demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion detection systems (IDS) ______________, hosts or applications for unauthorized activity.

A

monitor networks;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of Intrusion detection systems?

A

They can use signature-based or anomaly-based detection methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Signature-based IDS work?

A

compare traffic to known attack signatures. Good except when there is a new attacker whose name is not recognized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does anomaly-based IDS work?

A

Looks for deviations from normal traffic patterns. Can produce a large amount of false positives because during normal activity due to unusual amount of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network IDS placement requires careful consideration to avoid ____________. Putting them behind other _____ devices can help ___________________________.

A

overload; filtering; reduce obviously unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Host-based IDS monitor individual hosts for _________ _________ __________, looking at __________________, ____________, and other indicators of compromise.

A

signs of intrusion; system logs, file integrity,

18
Q

Intrusion prevention systems (IPS) are similar to IDS but can do what?

A

Actively block or prevent detected intrusions, not just detect and alert.

19
Q

__________ _____________ _______________ ___________verify that devices meet security requirements before allowing them to connect to the network.

A

Network Access Control (NAC) systems

20
Q

Virtual Private Networks (VPNs) do what?

A

create encrypted tunnels for secure communication over untrusted networks like the Internet.

21
Q

How can VPN be implemented?

A

VPNs can be implemented using various protocols like IPsec, SSL/TLS, or PPTP, each with different security characteristics.

22
Q

Wireless networks face unique security challenges due to their _______ and ease of .

A

broadcast nature; interception

23
Q

encryption for wireless networks is considered insecure and should not be used; ________ and __________ are recommended instead.

A

WEP; WPA or WPA

24
Q

Secure protocols like ___________, ____________, ______________should be used instead of their insecure counterparts to protect data in transit.

A

HTTPS, SSH, and SFTP

25
Q

Network security tools like Nmap, Wireshark, TCPdump, Kismet, and Metasploit can be used for what?

A

To test and verify network security measures.

26
Q

__________ and ___________ are _________ systems used to detect, deflect, or study attacker behavior.

A

Honeypots and honeynets, decoy

27
Q

You can test the security of your firewalls and how they respond using scanning tools such as _______.

A

Scapy

28
Q

For what might you use the tool Kismet?

A

To detect wireless devices on a network

29
Q

Explain the concept of segmentation.

A

Network segmentation creates SUBNETS - you can then control the flow of information between the subnets. Can help with productivity by containing traffic and localizing network issues.

30
Q

What are the two main categories wireless encryption?

A

WEP(Wired equivalent Privacy and WPA(2,3), wifi protected access

31
Q

What tool might you use to scan for devices on a network?

A

A port scanner - Nmap

32
Q

Which tools can you use to sniff traffic on a wireless network?

A

Wireshark, Kismit

33
Q

What would you use if you needed to send sensitive data over an untrusted network?

A

VPN

34
Q

What would you use a DMZ to protect?

A

Internal servers behind a public facing website.

35
Q

What is the difference between a stateful firewall and a deep packet inspection firewall?

A

Stateful firewall examines the structure of the network traffic and filters out undesirable content. Deep packets inspection firewall can reassemble the individual packets to see what is being sent to the destination application.

36
Q

Why are there privacy concerns over deep packet firewall protection?

A

Someone in control can read all your emails, instant messaging.

37
Q

What can a company use to keep SPAM and malware from reaching employees?

A

Proxy Server

38
Q

What is a packet crafting attack?

A

When an attacker uses traffic packets designed to avoid detection by IDS, firewalls and carry malicious code.

39
Q

What is a SSH and why is it useful?

A

Secure Shell. A safer protocol and you can send many different types of traffic over it.

40
Q

whats a ZERO DAY ATTACK?

A

A new or unpublished attack or vulnerablility.

41
Q

What is a protocol for securing communications?
POP

HTML

SSH

FTP

A

SSH does secure communications.

42
Q
A