8 - 2: Secure Networking Design Flashcards

1
Q

Firewalls

A

Group systems into network segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three network interfaces of border firewalls

A

Exterior internet,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First border

A

Between the protected interior network and the outside internet. Only allows traffic screened against security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Second border

A

Connects to org intranet, subdividing systems based on use, including endpoints, guest access, devices, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Third border

A

Connects to the DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DMZ

A

Demilitarized zone, where org systems that must connect with the outside internet, such as email, are kept secured. Extra layer in case of their compromise, considering the extra risk they face. Also called a screen sub-layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero trust

A

A newer approach replacing the DMZ method, where systems do not gain special privileges based on network location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extranets

A

Special intranet segments that allow outsiders access for maintenance and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeynets

A

Decoy networks security teams use to attract attackers to study their behavior and capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ad hoc networks

A

Temporary networks that emerge outside typical security design, typically for use on a certain project or use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

East-West traffic

A

Network traffic between systems in a data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

North-South traffic

A

Network traffic between data centers and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual LANs

A

Logically grouped together systems regardless of where they are located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VLAN steps

A

1) enable VLAN trunking to allow switches in different locations to carry the same VLANs 2) configure each switchboard to connect to the appropriate VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where are firewalls placed?

A

Wherever a boundary is intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network data collectors

A

Network taps, port mirrors

17
Q

Network data collector placement

A

Placed on the segment they are intended to collect data from

18
Q

Aggregation / distribution switches

A

Connect downstream access switches to each other

19
Q

Port mirroring

A

Allows traffic monitoring on a single switchport

20
Q

Security Information and Event Management

A

Collects all kinds of data, including network data, and aggregates it. Best practice is to minimize distance between collection and record

21
Q

Protection tools

A

Proxy servers and content filters

22
Q

Protection tool placement

A

Within the DMZ

23
Q

Correlation engine

A

Sensitive device that should be kept on a protected network

24
Q

VPN concentrators

A

Aggregate inbound network connections from users, including remote access

25
Q

VPN concentrator placement

A

Commonly on their own VLAN. Can place separate concentrators on VLANs and have them align to a directory, directing remote users based on their identity or role

26
Q

SSL accelerators

A

Handle the core of TLS cryptography work, so the web server can commit to web content

27
Q

Load balancers

A

Allocate inbound traffic across available web servers to maintain consistency

28
Q

SSL accelerator and Load Balancer location

A

Within the DMZ

29
Q

DDOS

A

Distributed Denial of Service, where a service is flooded with illegitimate traffic to block access

30
Q

DDOS mitigation placement

A

As close to the internet connection as possible

31
Q

Software-defined Networking

A

Allows network admins to treat the functionality and implementation details of a network as separate and distinct functions

32
Q

Network management planes

A

Control plane and data plane

33
Q

Control plane

A

Routing and switching decisions

34
Q

Data plane

A

Carrying out the instructions of the control plane

35
Q

SDN role

A

Separate control and data planes, and coordinate how each router and switch makes decisions. This makes the network programmable

36
Q

SDN security benefits

A

1) granular control 2) quicker responses

37
Q

SDN security risks

A

1) makes it more complex 2) requires stronger access control