Chapter 7: Delving into Network and Security Concepts Flashcards

1
Q

prevents unauthorized access to the corporate network; we tend to use back-to-back configuration

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internal Network

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is an application firewall that is build into desktop operating systems, such as Windows 10 operating system.

A

Host-Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this is a hardware appliance that keeps the network safe. It is vital that only the ports required are open. The network based firewall is placed at the edge of the network to prevent unauthorized access.

A

Network-Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

: this looks deep at the application and its traffic to see whether it is allowed through

A

stateful firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

could also be called packet-filtering firewall. It only looks at whether the packet is permitted and never looks in depth at the packet format

A

stateless firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is placed on a web server and its role is to protect web-based applications running on the webserver

A

Web Application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a multipurpose firewall: it does malware, content, and URL filtering. –all in one security appliance

A

Unified Threat Management Firewall (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this is a firewall that is application aware and can be used for both on premise and a cloud environment. It has cloud intelligence and the capabilities of an intrusion prevention system.

A

Next Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

where a request from a private internal IP address is translated to an external IP public address, hiding the internal from the external attack.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

device that connects two different networks when setting up a host machine
-known as the default gateway.
-used by your company to give you access to other networks—for example the internet

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ensure applications have the amount of bandwidth they need to operate when there is limited network bandwidth.

A

Quality of Service (QOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when two or more switches are joined together they can create loops that create broadcast storms—Spanning Tree Protocols (STPs) prevent this by blocking, listening, or forwarding ports.

A

Loop Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

frames that contain information about the STP

A

Bridge Protocol Data Units (BPDU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

set up on a port of a switch so that when the data arrives at that port, a splitter sends a copy to another device for later investigation.
-will inform NIDS Network Intrusion Detection System

A

Port mirror (port spanning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

link aggregation allows you to connect multiple switches so that they work as a single logical unit and prevent looping
Switch 1/Switch 2/Switch 3–>________

A

Aggregation Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

when security teams are trying to find out the attack methods that hackers are using, they set up a website similar to the legitimate website with lower security. When the attack commences, the security team monitors the attack methods so that they can prevent future attacks.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Group of honeypots

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a decoy file that is probably called password.txt so that it attracts the attention of an attacker. An alert has been set up to alert the security team once that fie has been opened.

A

Honey File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

where the cybersecurity team notices that an attacker is using tools such as IP or Port Scanner to gain information about your network. They then send false information back to the attacker.

A

Fake Telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a server that controls requests from clients seeking resources on the internet or an external network. Think of it as a go between that makes requests on behalf of the client ensure that anyone outside of your network does not know the details of the requesting host.

A

Proxy Server

22
Q

3 main functions of a Proxy Server

A

-URL Filter: companies may not want their employees to go to certain websites so they block them (example: espn.com)
-Content filter: looks at the content on the requested web page. It will block the request depending on what filters are set up. If we block gambling then users that try and visit a poker or horse betting site are blocked.
-Web page caching: purpose is to reduce the bandwidth being used as well to make access to web pages faster as they are actually obtaining content from their LAN

23
Q

The IT team sets up jobs to cache web pages; for example they cache espn.com at 3am local time to ensure it has the latest results

A

Active Caching

24
Q

when new web pages are being requested the pages are fetched and submitted to the requesting a host and a copy is then placed in the cache. That way, the second time it is requested, it is retrieved from the cache

A

Passive caching

25
Q

this deals with requests on behalf of another server. It could be, for example, a page within an online ship that loads its content and displays from another location outside the shop

A

Application Proxy

26
Q

he flow of traffic from a _______ is incoming traffic from the internet coming into your company network; placed in a boundary network called a screened subnet

A

reverse proxy

27
Q

also known as a jump host or jump box, is a hardened host that could be used as an intermediary device or as a gateway for administrators who would then connect to other servers for remote administrators. It would only have secure remote access tools installed. It could be used to SSH into the screened subnet or an Azure public network

A

Jump Server

28
Q

is a device that is used when there is a high volume of traffic coming into the companys network or web server. It can be used to control access to web servers, video conferencing, or email.

A

Load Balancer

29
Q

load balancer knows status of all web servers in the server farm and knows which web servers are least utilized by using a scheduling algorithm.

A

Least Utilized Host

30
Q

the request is sent to the same web server based on the requesters IP address. This is also known as persistence or a stick session where the load balancer uses the same server for the session

A

Affinity

31
Q

when the request comes in the load balancer contacts the DNS server and rotates the request based on the lowest IP address first

A

DNS Round Robin

32
Q

Load balancer configuration where–>load balancers act like an array dealing with the traffic together as they are both active. One load balancer deals with the workload of two

A

Active/Active

33
Q

you have a pair of load balancers. The active node is fulfilling load balancing duties and the passive node is listening and monitoring the active node. Should the active node fail, the passive will take over.

A

Active/Passive

34
Q

legacy server where dial up network is used. This has been discontinued because no speed

A

Remote Access Server

35
Q

located in the company’s network and client has software to allow connection but it utilizes the internet; this makes it cheaper to use.

A

Virtual Private Network (VPN)

36
Q

most secure tunneling protocol that can use certification, Kerberos authentication, or a preshared key. Provides both a secure tunnel and authentication

A

L2TP/IPSec

37
Q

this works on legacy systems and uses SSL certificates for authentication

A

Secure Socket Layer (SSL) VPN

38
Q

similar to SSL VPN it uses certificates for authentication. It is easy to setup just need an HTML 5 browser such as Opera, Edge, Firefox, or Safari.

A

HTML 5 VPN

39
Q

consists of either SHA 1 (160 bits) or MD 5 (128 bits) protocols, which ensure the packet header has not been tampered with in transit.

A

Authenticated Header (AH)

40
Q

uses DES (56), 3DES(168), or AES (256). Symmetric encryption protocols

A

Encapsulated Payload (ESP)

41
Q

–can be used to create a secure session between a client computer and server.
______ Handshake—Internet Key Exchange (IKE)
-Diffie Hellman is used to set up a secure tunnel before the data
*DH uses UDP port 500 to create quick mode—creates secure session so that data can flow through.

A

IPSec

42
Q

where IPSec session is used across internet as part of L2TP/IPSec tunnel. AH and ESP are both encrypted

A

Tunnel Mode

43
Q

IPSec tunnel is created with an internal network using a client/server to server communication. During transport, only ESP is encrypted

A

Transport Mode

44
Q

Low latency Point to point connection between two sites

A

Always on mode

45
Q

Layer 1 of OSI Model

A

The Physical Layer

-physical connection between devices

–hubs, modems, repeaters, cables (bits)

46
Q

Layer 2 of OSI Model

A

Data Link Layer

–responsible for the node to node delivery of the message

–Switches/bridge

–frame

47
Q

Layer 3 of OSI Model

A

Network Layer

–transmission of data from one host to the other located in different networks

–Router

-packet

48
Q

Layer 4 of OSI Model

A

Transport Layer

—refferred to as Segments
–responsible for the End to End Delivery of the complete message

–Firewall

49
Q

Layer 5 of OSI Model

A

Session Layer

–establishment of connection, maintenance of sessions, and authentication and also ensures security

–Gateway

–Message

50
Q

Layer 6 of OSI model

A

Presentation Layer
—data from application layer is extracted here

–JPEG/MPEG/GIF

–Message

51
Q

Layer 7 of OSI model

A

Application layer

–applications produce the data which has to be transferred over the network

–SMTP

–Message