8 - 4: Network Security Techniques Flashcards

1
Q

Two major objectives

A

Perimeter security and limit physical access to authorized users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Perimeter security

A

Keeping unwanted users out of the network entirely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control Lists

A

ACLs, the records of users allowed past a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Control

A

Intercepts network traffic coming from unknown devices and verifies authorization before beginning communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rules

A

The simplest form of restriction, expressed as technical terms or business logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAC Authentication protocol

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three systems in NAC protocol

A

1) Device attempting to connect to NAC network, must be running a supplicant 2) a switch that the device connects to, if a wired network 3) back-end authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supplicant

A

Performs all NAC duties on behalf of user and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticator

A

On wireless systems, the device/switch which receives credentials from the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Back-end authentication server

A

In NAC, performs authentication for all authenticators on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Additional NAC capabilities

A

Role-based access and posture checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role-based access

A

Once the authenticator knows user identity, it decides where they are placed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Posture checkers

A

Verify that systems connecting to the network meet certain criteria, such as current antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inbound NAC

A

NAC device is directly involved with making and enforcing access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outbound NAC

A

NAC device makes enforcement decisions, everything else makes the networking decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall errors

A

Shadowed rule, promiscuous rules, orphaned rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Shadowed rule

A

A rule base contains a rule that will never be executed because it is placed in the rule base. Occurs when rules are executed from general to specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Promiscuous rules

A

Violate the rule of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Orphaned rules

A

When a system or service is decommissioned but the rules are not removed from the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Standard Access Control List entries

A

access-list [number] [permit/deny] [source] [mask]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Extended Access Control Lists

A

Block addresses based on source and destination addresses, protocols, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why firewalls over routers?

A

1) purpose specific and efficient 2) advanced rule capability 3) integrate with and have advanced security function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VLAN pruning

A

The least privilege rule applied to the amount of VLANS

24
Q

VLAN hopping

A

Moving from one VLAN to another with more access/resources, typically by impersonating a switching

25
VLAN hopping
Moving from one VLAN to another with more access/resources, typically by impersonating a switching
26
Mitigating VLAN hopping
Deny automatic VLAN trunk negotiation and only trunk when a net admin allows
27
Port security
Limits MAC addresses to prevent disconnecting devices from switches and replacing them with a rogue device
28
Port security modes
Static and dynamic
29
Static port security
admin manually configures each switch port with the allowable MAC address. Slower but safer
30
Dynamic port security
Admin enables port security then has it remember the first MAC address it sees then restrict access to that one. Faster but riskier
31
DHCP snooping
Blocks malicious DHCP traffic, checking it for proper format and origination
32
SYN flood
An attack sending thousands of partially opened TCP connections of only the initial SYN packets but not answering the SYN-ACK packets
33
MAC flooding
Attackers send large numbers of different MAC addresses to a switch hoping to overflow a switches MAC address table, causing it to forget where devices are, then flood traffic, enabling eavesdropping
34
Flood guard protection
Controls the number of open connections that each source system may have
35
Routing loops
Occur when there are multiple physical paths between two network devices which begin mistakenly routing broadcast traffic redundantly
36
Broadcast storm
When a routing loop occurs and no capacity is left for legitimate use
37
Spanning tree protocol
Prevents loops by allowing multiple physical connections between devices, but restricts logical connections preventing the final links forming a loop
38
Bridge Protocol Data Units
Status massages spanning tree protocols use
39
Firewall log details
Connection attempts, timestamps, relevant firewall rule deployed
40
Firewall log use
1) incident response 2) connectivity issues 3) regular monitoring for anomalous connections
41
Network flow data
Keeps records of network traffic as summary details, but not packet contents or enclosed data
42
SNMP
Simple Network Management Protocol, capable of automating many of the tasks related to administration
43
SNMP components
Managed devices, SNMP agent
44
Managed devices
Any networking devices overseen by SNMP
45
SNMP agent
Software on the managed device allowing communication with the SNMP service
46
Network management system
Central system responsible for communicating with SNMP agents and managing the network
47
Get request
When the network management system wants information from a managed device
48
Current SNMP version
SNMP version 3
49
SNMP trap
Communication sent when a managed device has information to report to the management system
50
Jump boxes
Allow administrative connections for facilitating connection, or jumping, between security zones in a segmented system. Can be a powerful tool to circumvent network segmentation. Have a bunch of different names
51
Darknets
IP address space that is not legitimately used but monitored for attacker activity
52
Honeyfiles
Files intended to look like legitimate data/filters, but actually keep garbage
53
Honeypots
Fake networks intended to lure attackers, but immediately alerts security staff
54
Honeynets
Large-scale, multiple honeypots used to lure attackers
55
DNS sinkhole
Altered DNS records used to reroute malicious botnet traffic