8 - 3: Network Security Devices Flashcards

1
Q

Switches

A

Connect devices to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Access Points

A

Connect to switches to create Wi-fi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switches operate at _____ of the OSI model

A

Level 2: data. MAC addresses only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a switch happens to operate at level _ of the OSI model, it can _____

A

3, interpret IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Routers

A

Aggregate network traffic going to or from large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Router functions

A

Intelligently management packets, provide security by maintaining an access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stateless inspection

A

Restricting network traffic without regard to connection state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bridges

A

Simply connect two networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

Determine if connections should be allowed based on security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls often sit at:

A

The perimeter between routers and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateless inspection (firewalls)

A

Inspecting packets as they came through the firewall, highly inefficient and had no historical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DMZ

A

accepts external communications and isolates them from internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful inspections

A

Monitor active connections, where the firewall monitors packet traffic for the duration of the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall rule contents

A

1) Source System Address, 2) Destination System Address 3) Destination Port and Protocol 4) allow/deny action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default/Implicit deny

A

If a request does not align to a rule, it is automatically denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NGFW

A

Next Generation Firewall, uses a lot of contextual information in making decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Other firewall roles

A

Network Address Translation, content/URL filtering, Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Web Application Firewall

A

A specialized firewall that blocks website content including HTML elements, SQL forms, outdated media, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network firewalls

A

Physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Host-based firewalls

A

Software Apps or OS components that reside on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advantage to using both firewall types

A

Achieves defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Proxy servers

A

Connect to a websites on a users’ behalf and is in the middle of a server/client connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Proxy security benefits

A

1) Anonymity - only captures proxy server name 2) Performance - proxy server caches frequent pages 3) Content filtering - the proxy server itself can filter content on visited pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Forward proxies

A

Work on behalf of clients, web servers are not aware they are communicating with a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Reverse proxies

A

Work on behalf of servers sitting on a remote network, receiving client requests, passing them on to a proxy, then eventually on to the web server itself

26
Q

Transparent proxies

A

Work without either client or servers’ knowledge. Causes some errors with TLS encryption

27
Q

Load balancers

A

Scale network traffic to meet demand by answering which servers will answer what demands

28
Q

Virtual IP address

A

The address where a load balancer receives requests before deciding how to answer

29
Q

Autoscaling

A

Automatically adding more servers to answer demand

30
Q

Load balancer security roles

A

SSL certificate management, URL filtering, web application functions

31
Q

Round-Robin load balancing

A

The load balancer rotates through a pool of available servers giving each an equal load. Not the best as not all servers are equal.

32
Q

Advanced Scheduling Algorithms

A

Distribute requests based an algorithm accounting for performance, current load

33
Q

Session persistence

A

Routing an individual’s requests to the same server using the regular scheduling algorithm

34
Q

Load balancer caution

A

Can be a single point of failure, keep them in high availability mode

35
Q

Load balancer approaches

A

Active-Active: 2 balancers running continuously

Active-Passive: 1 balancer running, 1 in a backup. Monitors sessions and is ready to go if the first fails

36
Q

VPN roles

A

Connect remote locations to each other, connect remote users to locations. Significant encryption resource use

37
Q

VPN mechanism

A

Creates a tunnel encrypting incoming traffic and decrypting outcoming traffic.

38
Q

VPN endpoints

A

Firewall, router, server, dedicated concentrator

39
Q

IPsec

A

Internet Protocol Security, an earlier method of creating VPN tunnels at the network OSI layer, typically for site-to-site tunnels

40
Q

L2TP

A

Layer 2 Tunneling Protocol - a protocol IPsec supports

41
Q

Remote user VPNs

A

Typically use port SSL/TLS encryption on port 443

42
Q

HTML5 VPN

A

Web based interface which makes use of internal network resources and proxies for VPN connections entirely within a web browser

43
Q

Full-tunnel VPN

A

All traffic is routed through the tunnel, regardless of its destination

44
Q

Split-tunnel VPN

A

Only traffic intended for the organization is routed through the VPN tunnel. Recommended against because even though they conserve bandwidth, they may confuse users as they are not technically always secure

45
Q

Always-on VPN

A

Devices connect to a VPN at boot

46
Q

Intrusion detection

A

Monitors network traffic for potentially malicious traffic and alerts administrators

47
Q

Intrusion prevention

A

Monitors network traffic for potentially malicious traffic and automatically blocks when detected

48
Q

False positive

A

Alerted to a threat that did not take place

49
Q

False negative

A

An event took place but was not alerted

50
Q

Signature-based detection

A

Screens activity against a database of actions, as signatures. AKA rule-based detection

51
Q

Anomaly detection

A

Develops a model of what is baseline or normal behavior, then checks network activity against that baseline

52
Q

IDS/IPS systems are at ____ level

A

Application / OSI level 7

53
Q

Anomaly detection is AKA

A

Behavior detection or heuristic detection

54
Q

In-band / inline deployment

A

IPS sits directly on the network path and all communications must pass through it. Raises risk of, if the inline IPS fails, it could disrupt all network communications

55
Q

Out-of-band

A

IPS sits outside the flow of network traffic, connected to a SPAN port on a switch allowing it to receive copies of traffic sent through the network. AKA passive mode, because it can react by sending block commands for future communications but cannot stop them while they happen

56
Q

Protocol analyzers

A

Allow looking at individual packets traveling through a network

57
Q

Wireshark

A

A widely used, free protocol analyzer

58
Q

tcpdump

A

A command-line protocol analyzer

59
Q

tcpreplay

A

A command-line tool that allows editing and replaying packet captures

60
Q

Unified Threat Management

A

A device that combines all security services into a single unit. Don’t usually perform SSL termination