Chapter 3 Cloud and Physical Security Flashcards
What are the types of monitoring in network design?
Signature-based, network-based, and anomaly-based
Explain network-based monitoring.
Attached to the network in a place where it can monitor all traffic for passive and active responses.
Explain signature-based monitoring.
Watches for intrusions that match a known identity or signature against a “signature database”. Requires regular updates.
Explain anomaly-based monitoring.
Detects unusual activities based on an initial learning period before anomalies can be detected. Is also referred to as behavior-based and heuristic-based detection.
Explain behavioral-based monitoring.
Monitors behavior that is not allowed and acts accordingly.
What is an appliance firewall and another name for it?
A “hardware firewall” is designed to be a stand-alone solution that can be plugged into a network and operated with minimal configuration and maintenance.
What is IPSec?
Hints: What are the security protocols? What are the modes?
IPSec uses ESP (Encapsulating Security Payload) and AH (Authentication Header) as security protocols. It can operate in tunnel mode (entire packet is encrypted) or transport mode (only the payload is encrypted). IPSec sets a secure channel using strong encryption and authentication between two network devices, often providing implementation in securing VPN communications.
What are the different WAP’s?
Controller-based, thin, and fat (a.k.a. stand-alone).
What is a controller-based WAP?
A wireless access point that allows the management of all WAPs in the network from a centralized location, allowing consistent configuration settings for updates and policies.
What is a fat WAP?
Fat wireless access points (stand-alone) can be remotely configured however they must be manually configured. They also don’t allow management of several WAP’s from a single location.
What is a thin WAP?
Thin wireless access points allow configuration from a switch or router
What is a PIV?
Personal Identity Verification cards are certificate-based smart cards that have a picture, integrated chip, two bar codes, and a magnetic strip. These are issues to non-military federal employees and contractors.
What is a CAC?
Common Access Cards are certificated-based smart cards that have a picture, integrated chip, two bar codes, and a magnetic strip. These are issued by the DoD (Department of Defense) to military personnel and contractors.
What are the different types of antennas?
Omni, Yagi, Sector, and Dipole.
What is an Omni antenna?
Multi-directional antenna that radiates radio waves in all directions uniformly
What is a Yagi antenna?
A directional antenna with a high gain and a narrow radiation pattern
What is a Sector antenna?
A directional antenna with a circle measured in degrees of arc radiation pattern
What is a Dipole antenna?
The most widely used antenna with a radiation pattern shaped like a doughnut.
What is a CRL in a PKI, in regards to a CA?
A certificate revocation list (CRL) contains a list of serial numbers for digital certificates that have not expired, but that a certification authority (CA) has specified to be invalid.
What is a KDC and what is it used for?
A Key Distribution Center (KDC) is used in Kerberos network authentication to distribute resource access keys.
What is a dual-homed firewall?
A firewall with TWO network interfaces for network segregation. One with connection to a public network (the internet) and the other connecting to the private network.
What is a screened subnet?
Another term for a DMZ (demilitarized zone) where two firewalls are used: one firewall is between the public network and the DMZ and another is between the DMZ and the private network
What is a proxy server?
A proxy server acts as an internet gateway, firewall, and internet caching server for a private network.
What is an ACL?
Access Control Lists (ACLs) limit the users that are allowed connections