Chapter 3 and 5 Flashcards
span
Switch Port Analyzer: known as mirrored ports, it allows a switch to mirror a port’s traffic to another port.
Easiest way to deploy a VPN
An TLS/SSL vpn which does not require a client.
Decentralized placement to manage multiple data centers.
can provide increased resilience because a failure or compromise of service will not disrupt other locations.
Users want to have a simple experience connecting to company’s resources.
TLS VPN does not require a client.
What is the primary reason for parallel processing
Allows for systems to be tested without taking them offline.
What are the IPsec protocols
AH, ESP, IKE (internet key exchange)
Can NAC tools allow for authentication?
Yes, it can allow for user groups, roles, and VLANS that separate the groups based on roles.
ACL, VLANS, and firewalls can implement network segmentation.
air gaps create operational challenges so it’s unlikely.
NAC
NAC helps divide networks into logical security zones for unauthorized access. It uses a software agent, which adds complexity, but it can be agentless.
802.1X
standard for authenticating devices connected to wired and wireless networks using EAP. And it’s used for port based authenticating.
Port Security
allows you to limit the number of MAC addresses that a single port on a switch can use.
CVE
is a vulnerability feed
Bug Bounty
A bug bounty is a program offered by organizations, companies, or even independent software developers to reward individuals (commonly referred to as ethical hackers, security researchers, or bug hunters) who discover and report vulnerabilities or security flaws in their systems.
false negative
is when an issue exists and it is not identified
false postive
is when a scanner picks up and issue but it doesn’t exists.
Oauth
is a common authorization service used by cloud services.