Implementing A Secure Network Flashcards

1
Q

explain the difference between segregation, segmentation and isolation

A

segregation is is the separation of a SENSITIVE network from a less sensitive one, e.g. your home network from the internet.
Segmentation is about dividing up the network into smaller segments to reduce traffic and control access between segments
Isolation is about physically isolating the network or device from other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by red networks and black networks?

A

It relates to physical separation of networks. Red networks are classified and should not be connected to black networks (unclassified)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would you implement a reverse proxy for internet users accessing your web server?

A

It improves performance by caching commonly accessed web pages
It can act as a load balancer to balance requests across multiple web servers increasing efficiency
Increases security by separating the web server from public connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What device would you implement if you wanted save your administrator time and effort managing various security appliances like proxies and firewalls? Why?

A

Purchase a Unified Threat Management appliance. It combines several security applications into a single, easily administered device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If you wanted to protect sensitive information from outgoing email, what capability would you need and on what device could implements it?
What two methods does it use to achieve this?

A

A mail gateway with Data Loss Prevention Capabilities that checked for sensitive information and blocks it.

1) it uses content filtering to detect confidential or sensitive information
2) It also encrypts outgoing email to ensure confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a VLAN an example of Network isolation, why?

A

Yes. Because you can completely isolate groups of devices and their traffic that sit on the same physical switch by assigning VLANs to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security device commonly include a DDoS mitigator?

A

UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What device can implement the two use cases below?
Prevent IP address spoofing using ACLs
provide secure management of (the said devices themselves) using SNMPv3

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between static NAT, dynamic NAT and Port Address Translation?

A

static NAT maps a single private address to a single public ip address.
dynamic NAT maps a a pool of public IP address to multiple private addresses
PAT can map multiple internal addresses to a single public IP by using port numbers to separate communication and route data to the correct internal IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

you have some older computers that can’t connect to the newer wifi network because they don’t support the higher encryption standards, but you need to keep them. What should you do?

A

Connect them to a separate wifi network on their own so they don’t compromise the other wifi network as allowing them to connect to that could allow attackers onto the wifi APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly