Chapter 3 - Building a Security Strategy Flashcards

1
Q

What is a Borderless End Zone?

A

This is where devices connect to the network. Malware, viruses, and malicious software is a big concern. NAC and ISE can be used to interrogate devices before they are allowed onto the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Borderless Data Center?

A

This is typically a cloud-driven business environment that could provide services. ASA’s and IPS are used to protect network resources here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Borderless Internet?

A

Basically, the entire Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Policy Management Point?

A

Enterprise tools that allow implementation of security measures across the entire network.

Cisco Security Manager (CSM) and Cisco Access Control Server (ACS) are examples of these tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is NAC?

A

Network Admissions Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ISE?

A

Identity Services Engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is CSM?

A

Cisco Security Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ACS?

A

Cisco Access Control Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is “context-aware” security?

A

Security enforcement that involves the observation of users and roles in addition to interface-based controls.

Ex: An Access Control Server (ACS) that allows an admin full rights when logged in from inside the network, but allows restricted access via remote device or smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SecureX?

A

This is Cisco’s security framework to establish and enforce security policies across a distributed network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Security Intelligence Operations (SIO)?

A

SIO is a cloud based service managed by Cisco. It identifies and correlates real-time threats so that customers can leverage this information to better protect their networks. (Learn about a new attack, so you can better protect your network before it hits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TrustSec?

A

TrustSec is part of the Cisco SecureX security architecture strategy. Its idea is to create “a distributed access policy enforcement mechanism”. It may use encryption to provide confidentiality.

It’s main goal is to provide end-to-end security based on who, what, where, and how users are connected to the network.

Actual toolsed used for TrustSec are:

ISE, NAC, and AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Security Group Tag?

A

Security Group Tags (SGTs)

Once a device is authenticated, Cisco TrustSec tags any packet that originates from that device with a security group tag (SGT) that contains the security group number of the device. The packet carries this SGT throughout the network within the Cisco TrustSec header. The SGT is a single label that determines the privileges of the source within the entire enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly