8 - 3: Network Security Devices Flashcards

1
Q

Switches

A

Connect devices to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Access Points

A

Connect to switches to create Wi-fi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switches operate at _____ of the OSI model

A

Level 2: data. MAC addresses only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a switch happens to operate at level _ of the OSI model, it can _____

A

3, interpret IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Routers

A

Aggregate network traffic going to or from large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Router functions

A

Intelligently management packets, provide security by maintaining an access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stateless inspection

A

Restricting network traffic without regard to connection state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bridges

A

Simply connect two networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

Determine if connections should be allowed based on security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls often sit at:

A

The perimeter between routers and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateless inspection (firewalls)

A

Inspecting packets as they came through the firewall, highly inefficient and had no historical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DMZ

A

accepts external communications and isolates them from internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful inspections

A

Monitor active connections, where the firewall monitors packet traffic for the duration of the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall rule contents

A

1) Source System Address, 2) Destination System Address 3) Destination Port and Protocol 4) allow/deny action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default/Implicit deny

A

If a request does not align to a rule, it is automatically denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NGFW

A

Next Generation Firewall, uses a lot of contextual information in making decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Other firewall roles

A

Network Address Translation, content/URL filtering, Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Web Application Firewall

A

A specialized firewall that blocks website content including HTML elements, SQL forms, outdated media, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network firewalls

A

Physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Host-based firewalls

A

Software Apps or OS components that reside on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advantage to using both firewall types

A

Achieves defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Proxy servers

A

Connect to a websites on a users’ behalf and is in the middle of a server/client connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Proxy security benefits

A

1) Anonymity - only captures proxy server name 2) Performance - proxy server caches frequent pages 3) Content filtering - the proxy server itself can filter content on visited pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Forward proxies

A

Work on behalf of clients, web servers are not aware they are communicating with a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Reverse proxies
Work on behalf of servers sitting on a remote network, receiving client requests, passing them on to a proxy, then eventually on to the web server itself
26
Transparent proxies
Work without either client or servers' knowledge. Causes some errors with TLS encryption
27
Load balancers
Scale network traffic to meet demand by answering which servers will answer what demands
28
Virtual IP address
The address where a load balancer receives requests before deciding how to answer
29
Autoscaling
Automatically adding more servers to answer demand
30
Load balancer security roles
SSL certificate management, URL filtering, web application functions
31
Round-Robin load balancing
The load balancer rotates through a pool of available servers giving each an equal load. Not the best as not all servers are equal.
32
Advanced Scheduling Algorithms
Distribute requests based an algorithm accounting for performance, current load
33
Session persistence
Routing an individual's requests to the same server using the regular scheduling algorithm
34
Load balancer caution
Can be a single point of failure, keep them in high availability mode
35
Load balancer approaches
Active-Active: 2 balancers running continuously | Active-Passive: 1 balancer running, 1 in a backup. Monitors sessions and is ready to go if the first fails
36
VPN roles
Connect remote locations to each other, connect remote users to locations. Significant encryption resource use
37
VPN mechanism
Creates a tunnel encrypting incoming traffic and decrypting outcoming traffic.
38
VPN endpoints
Firewall, router, server, dedicated concentrator
39
IPsec
Internet Protocol Security, an earlier method of creating VPN tunnels at the network OSI layer, typically for site-to-site tunnels
40
L2TP
Layer 2 Tunneling Protocol - a protocol IPsec supports
41
Remote user VPNs
Typically use port SSL/TLS encryption on port 443
42
HTML5 VPN
Web based interface which makes use of internal network resources and proxies for VPN connections entirely within a web browser
43
Full-tunnel VPN
All traffic is routed through the tunnel, regardless of its destination
44
Split-tunnel VPN
Only traffic intended for the organization is routed through the VPN tunnel. Recommended against because even though they conserve bandwidth, they may confuse users as they are not technically always secure
45
Always-on VPN
Devices connect to a VPN at boot
46
Intrusion detection
Monitors network traffic for potentially malicious traffic and alerts administrators
47
Intrusion prevention
Monitors network traffic for potentially malicious traffic and automatically blocks when detected
48
False positive
Alerted to a threat that did not take place
49
False negative
An event took place but was not alerted
50
Signature-based detection
Screens activity against a database of actions, as signatures. AKA rule-based detection
51
Anomaly detection
Develops a model of what is baseline or normal behavior, then checks network activity against that baseline
52
IDS/IPS systems are at ____ level
Application / OSI level 7
53
Anomaly detection is AKA
Behavior detection or heuristic detection
54
In-band / inline deployment
IPS sits directly on the network path and all communications must pass through it. Raises risk of, if the inline IPS fails, it could disrupt all network communications
55
Out-of-band
IPS sits outside the flow of network traffic, connected to a SPAN port on a switch allowing it to receive copies of traffic sent through the network. AKA passive mode, because it can react by sending block commands for future communications but cannot stop them while they happen
56
Protocol analyzers
Allow looking at individual packets traveling through a network
57
Wireshark
A widely used, free protocol analyzer
58
tcpdump
A command-line protocol analyzer
59
tcpreplay
A command-line tool that allows editing and replaying packet captures
60
Unified Threat Management
A device that combines all security services into a single unit. Don't usually perform SSL termination