8 - 4: Network Security Techniques Flashcards

1
Q

Two major objectives

A

Perimeter security and limit physical access to authorized users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Perimeter security

A

Keeping unwanted users out of the network entirely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control Lists

A

ACLs, the records of users allowed past a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access Control

A

Intercepts network traffic coming from unknown devices and verifies authorization before beginning communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rules

A

The simplest form of restriction, expressed as technical terms or business logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAC Authentication protocol

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three systems in NAC protocol

A

1) Device attempting to connect to NAC network, must be running a supplicant 2) a switch that the device connects to, if a wired network 3) back-end authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supplicant

A

Performs all NAC duties on behalf of user and system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticator

A

On wireless systems, the device/switch which receives credentials from the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Back-end authentication server

A

In NAC, performs authentication for all authenticators on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Additional NAC capabilities

A

Role-based access and posture checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role-based access

A

Once the authenticator knows user identity, it decides where they are placed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Posture checkers

A

Verify that systems connecting to the network meet certain criteria, such as current antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Inbound NAC

A

NAC device is directly involved with making and enforcing access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outbound NAC

A

NAC device makes enforcement decisions, everything else makes the networking decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall errors

A

Shadowed rule, promiscuous rules, orphaned rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Shadowed rule

A

A rule base contains a rule that will never be executed because it is placed in the rule base. Occurs when rules are executed from general to specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Promiscuous rules

A

Violate the rule of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Orphaned rules

A

When a system or service is decommissioned but the rules are not removed from the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Standard Access Control List entries

A

access-list [number] [permit/deny] [source] [mask]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Extended Access Control Lists

A

Block addresses based on source and destination addresses, protocols, and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why firewalls over routers?

A

1) purpose specific and efficient 2) advanced rule capability 3) integrate with and have advanced security function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

VLAN pruning

A

The least privilege rule applied to the amount of VLANS

24
Q

VLAN hopping

A

Moving from one VLAN to another with more access/resources, typically by impersonating a switching

25
Q

VLAN hopping

A

Moving from one VLAN to another with more access/resources, typically by impersonating a switching

26
Q

Mitigating VLAN hopping

A

Deny automatic VLAN trunk negotiation and only trunk when a net admin allows

27
Q

Port security

A

Limits MAC addresses to prevent disconnecting devices from switches and replacing them with a rogue device

28
Q

Port security modes

A

Static and dynamic

29
Q

Static port security

A

admin manually configures each switch port with the allowable MAC address. Slower but safer

30
Q

Dynamic port security

A

Admin enables port security then has it remember the first MAC address it sees then restrict access to that one. Faster but riskier

31
Q

DHCP snooping

A

Blocks malicious DHCP traffic, checking it for proper format and origination

32
Q

SYN flood

A

An attack sending thousands of partially opened TCP connections of only the initial SYN packets but not answering the SYN-ACK packets

33
Q

MAC flooding

A

Attackers send large numbers of different MAC addresses to a switch hoping to overflow a switches MAC address table, causing it to forget where devices are, then flood traffic, enabling eavesdropping

34
Q

Flood guard protection

A

Controls the number of open connections that each source system may have

35
Q

Routing loops

A

Occur when there are multiple physical paths between two network devices which begin mistakenly routing broadcast traffic redundantly

36
Q

Broadcast storm

A

When a routing loop occurs and no capacity is left for legitimate use

37
Q

Spanning tree protocol

A

Prevents loops by allowing multiple physical connections between devices, but restricts logical connections preventing the final links forming a loop

38
Q

Bridge Protocol Data Units

A

Status massages spanning tree protocols use

39
Q

Firewall log details

A

Connection attempts, timestamps, relevant firewall rule deployed

40
Q

Firewall log use

A

1) incident response 2) connectivity issues 3) regular monitoring for anomalous connections

41
Q

Network flow data

A

Keeps records of network traffic as summary details, but not packet contents or enclosed data

42
Q

SNMP

A

Simple Network Management Protocol, capable of automating many of the tasks related to administration

43
Q

SNMP components

A

Managed devices, SNMP agent

44
Q

Managed devices

A

Any networking devices overseen by SNMP

45
Q

SNMP agent

A

Software on the managed device allowing communication with the SNMP service

46
Q

Network management system

A

Central system responsible for communicating with SNMP agents and managing the network

47
Q

Get request

A

When the network management system wants information from a managed device

48
Q

Current SNMP version

A

SNMP version 3

49
Q

SNMP trap

A

Communication sent when a managed device has information to report to the management system

50
Q

Jump boxes

A

Allow administrative connections for facilitating connection, or jumping, between security zones in a segmented system. Can be a powerful tool to circumvent network segmentation. Have a bunch of different names

51
Q

Darknets

A

IP address space that is not legitimately used but monitored for attacker activity

52
Q

Honeyfiles

A

Files intended to look like legitimate data/filters, but actually keep garbage

53
Q

Honeypots

A

Fake networks intended to lure attackers, but immediately alerts security staff

54
Q

Honeynets

A

Large-scale, multiple honeypots used to lure attackers

55
Q

DNS sinkhole

A

Altered DNS records used to reroute malicious botnet traffic