Implementing Network Security 4 Flashcards

0
Q

List common network devices

A

Router. Connects multiple networks using the same protocol
Switch. Has multiple network ports and combines multiple physical network segments into s single logical network. Controls network traffic by creating switched connections containing only the two hosts involved in transmission
Proxy server. Isolated internal networks from the Internet by downloading and storing Internet files on behalf of internal clients.
Firewall. Any software or hardware device that protects a system or network by blocking unwanted network traffic
Load balancer. A network device whose primary function is to spread out the work among devices in a network. Devices perform more efficiently. Data processed faster.
All-in-one security appliance. A single network security device used to perform a number security functions to secure a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

List components that make up a network

A

Device. Any Piece if hardware
Media. Connects and carries the data between devices
Network adapter. Hardware that translates the data between the network and a device
Network operating systems. Controls network traffic
Protocol. Set of rules for network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a multifunction network device

A

Any piece of network hardware meant to perform more than one networking task without having to be reconfigured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an application aware device and give examples

A

A network device that manages the information of any applications that interface with it.
Examples include firewalls, IDS intrusion detection systems, IPS intrusion prevention systems, and proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List router discovery protocols

A

The language that routers use to communicate with each other

RIP. routing information protocol. Distance vector protocol
RIPv2 enhance features
IGRP. interior gateway routing protocol. Distance vector routing protocol
EIGRP. Enhanced interior gateway routing protocol. Proprietary routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some network analysis tools that function as security measures

A

Sniffer. Monitors network communication and captures data.
Spam filters. Used to read and reject incoming messages that contain known target words and phrases
Protocol analyzer. Diagnostic software that examines and displays data packets being transmitted over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IDS

A

Intrusion detection system

A detection control system that scans, audits, and monitors the security infrastructure for signs of attacks in profess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NIDS

A

Network intrusion detection system
A type of IDS uses passive hardware sensors to monitor traffic On a specific segment of the network. Cannot analyze encrypted packets because has no method toe decrypt data. Sniffs traffic and sends alerts about anomalies. Can spot a rogue machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s WIDS

A

wireless IDS
a type of NIDS that scans the radio frequency spectrum for threats to the wireless networks. Primarily roque access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IPS

A

Intrusion prevention system

Has the monitoring capabilities of IDS but actively works to blocks any detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NIPS

A

Network intrusion prevention system
Monitors suspicious network traffic and reacts in Real time to block it by dropping Unwanted data packets of resetting the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is WIPS

A

Wireless IPS
a type of NIPS that scans the radio frequency spectrum for threats to the wireless network, rogue access points, and can actively block malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of network monitoring systems

A

Behavior based monitoring. Learn over time which traffic is and is not allowed with the assistance of admin
Signature based monitoring. Uses a predefined set of rules to id unacceptable traffic
Anomaly based monitoring. Uses a database of unacceptable traffic patterns by analyzing traffic. Creates a performance baseline of acceptable flows.
Heuristic monitoring. Uses known best practices to identify and fix issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is VPN

A

Virtual Private Network

Provides secure connections between end points using tunneling to encapsulate and encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a VPN concentrator

A

A single device that incorporates advanced encryption and authentication methods to handle a large number of VPN tunnels. Geared toward secure remote access or site to site VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a web security gateway

A

A utility used to intentionally block internal Internet access to a predefined list of websites. Configured by administrators to deny access to a specified list of Uniform Resource Locators URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NAC

A

Network Access Control
The collected protocols, policies, and hardware that govern access on device network interconnections.
Provides an additional security layer that scans systems for conformance and allows or quarantines updates to meet policy standards.
Deployed based on three main elements
Authentication method, endpoint vulnerability assessment, and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a DMZ

A

a demilitarized zone
A small section of a private network this is located between two firewalls and made available for public access.
Enables clients to access data in private systems without compromising the security of the network as a while

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a VLAN

A

A Virtual Local Area Network
A point to point logical network that is created by grouping selected hosts together regardless of their physical location.
Uses a switch or router that controls the groups of hosts. Can provide network security by enabling admins to segment groups of hosts within the larger physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is subnetting

A

A network design used to divide large networks into smaller logical networks.
Each node is configured with an IP address and a subnet address to create subnetworks and a routing structure. Data flow and security measures can be managed more easily with these smaller scaled networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is NAT

A

Network Address Translation
simple form of Internet security that conceals internal addressing from the public internet. A router is configured with a single public IP address on its external interface and a private non routable address on its internal interface. Translates between the two addresses. Prevents external hosts from identifying and connecting directly to internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe remote access

A

The ability to connect to network systems and services from offsite or remote location.
Enables authorized users to access and use systems and services through s secure internet connection. Most secure when connecting through a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is telephony

A

Provides voice communications through devices over a distance.
Common components : VoIP, private branch exchange implementations, CTI computer telephony integration. Incorporates telephone, email, web, and computing infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe virtualization

A

Separates computing software from the hardware it runs via an additional software layer.
Adds flexibility and increases hardware utilization by running multiple OSs on a single computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe cloud computing

A

A method of computing that involves real time communication over large networks to provide the resources, software, data, and media needs of a user.
Relies on the Internet to provide computing capabilities anywhere in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cloud computing can be deployed using four basic methods

A

Private. Distributed by a single company. Hosted internally or off-site
Public. Done over the Internet to general consumers
Community. Multiple org share ownership of a cloud service
Hybrid. Combines two or more deployment methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The three main services that cloud computing provides

A

Software. SaaS software as a service. Using cloud to provide applications to users.
Platform. PaaS Platform as a Service. Using cloud to provide virtual systems like OSs
Infrastructure. IaaS Infrastructure as a Service. Using cloud to provide access to infrastructure needs a client may have. Link data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Briefly explain the OSI Model

A

Describes how a network is structured based in how it communicates with other elements in the network
Has seven layers with a specific order. Each layer supports the layer above it and is supported by the layer below it.
Encourages seamless and consistent communication between different types of network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Describe the physical layer of the OSI Model

A

Layer 1. Defines the connections between devices and physical transmission media.

Physical connection components: calling and wiring along with hubs, repeaters, switches, and adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe the data link layer of the OSI Model

A

Layer 2. Provides a link between two directly connected nodes as well as detecting and fixing error in the physical layer

Uses PPP point to point protocol
G.hn standard that defines telephony networking over power lines and coaxial cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe the network layer of the OSI Model

A

Layer 3. Provides the protocols for transferring data from one node to another in a system with multiple nodes with unique addresses

IP
ICMP
RIP

31
Q

Describe the transport layer of the OSI Model

A

Layer 4. Controls the reliability of data transmission between nodes in a network for the benefit of the higher layers.

TCP
UDP
SCTP Stream Control Transmission Protocol. Combines the features of TCP and UDP into one protocol

32
Q

Describe the session Layer of the OSI Model

A

Layer 5. Controls the connections between computers thorough check pointing so that connections when terminated may be recovered.

NFS Network File System. Allows clients to access files on a network a if they were assessing local storage
Socket Secure SOCKS. Routes data packets on a network through a proxy server and included authentication

33
Q

Describe the presentation layer of the OSI Model

A

Layer 6. Transforms data into a format that can be understood by the programs in the application layer

ICA independent computing architecture. Specified the transmission of data between client and application server

34
Q

Describe the application layer of the OSI Model

A

Layer 7. Allows client interaction with software by identifying resource and communication requirements

HTTP
FTP
DNS

35
Q

Describe the basic protocols that make up TCP/IP

A

TCP/IP transmission control protocol / Internet protocol
A non proprietary routable network protocol suite that enables computers to communicate over all types of networks

IPv4. Uses 32 bit binary address separated by dots into four 8 bit octets assigned to a computer on a TCP/IP network.

IPv6. Uses 128 bit binary address. Includes new features such as simplified assess headers, hierarchical addressing, support for time sensitive network traffic and a new structure for unicast addressing. Separated by colons into eight groups of four hexadecimal digits.

DHCP. Dynamic Host Configuration Protocol used to automatically assign IP addressing information to IP Network computers.

36
Q

Describe APIPA

A

Automatic Private IP Addressing
Service that enables DHCP client computers to initialize TCP/IP when DHCP is unavailable
DHCP clients get IP addresses when the DHCP servers malfunctions when computers have no connectivity. Self allocates addresses randomly from a small range. 169.254.0.1 to 169.254.255.254
Not routable.

37
Q

Describe DNS

A

The Domain Name System
The primary name resolution service on the Internet and private IP networks.
A hierarchical system of databases that map computer names to their associated IP addresses.

38
Q

What are the DNS security measures

A

Placing the DNS server in the DMZ and within the firewall perimeter
Setting firewall rules to block incoming non essential services requests
Exposing only essential ports
Strengthening DHCP filtering
Preventing buffers overflows.
Using Secure Sockets Layer SSL
Keeping the DNS updated regularly with patches issued by the OS vendor.
Backing up the DNS and saving the backups in different geographical locations.

39
Q

Describe HTTP

A

Hypertext Transfer Protocol
The TCP/IP protocol that enables clients to connect to and interact with websites. Responsible for transferring the dat on webpages between systems. Defines how messages are formatted and transmitted

40
Q

Describe how to effectively secure web servers

A

Remove unnecessary services running in the background.
Avoid remote access to web servers. Log on locally
Store web applications, website logs that contain user info on another secured drive
Install security patches regularly
Delete or disable unused user accounts.
Use the appropriate security tools
Use port scanners to scan the web servers regularly.

41
Q

Describe SSL/TLS

A

Secure Sockets Layer
Transport Layer Security

Security protocols that combine digital certificates for authentication with public key data encryption. Both protect sensitive communication fro eavesdropping and tampering by using secure, encrypted and authenticated channel over a TCP/IP connection.
A server driven process
TLS more secure than SSL but few websites implement them

42
Q

Describe HTTPS

A

Hypertext Transfer Protocol Secure
A secure version of HTTPS that supports web commerce by providing a secure connection between a web browser and a server. Uses SSL/TLS to encrypt data.

43
Q

Describe SSH

A

Secure Shell
A protocol used for secure remote login and secure transfer of data.
Consists of a server and a client. Encrypted using a variety of methods.
Preferred protocol for FTP
Used primarily on Linux and Unix systems to access shell accounts.
Microsoft does not offer native support. Can be implemented using a third party tool
Uses port 22

44
Q

Describe SNMP

A

Simple Network Management Protocol
A service used to collect info from network devices (servers, routers, printers) for diagnostic and maintenance purposes.
Two components : management systems and agent software.
The agents send info to a SNMP manager which notifies an admin of problems, run a corrective program, store the info for review or ask the agent about a specific network device

45
Q

Describe ICMP

A

Internet Control Message Protocol
An IP network service that reports on connections between two hosts.
Used for the ping command that checks for a response from a particular target host.
Attackers can use redirected ICMP packets in two ways
To flood a router and cause a DoS attack by consuming resources (smirk attack) and to reconfigure routing tables by using forged packets.

46
Q

Describe IPSec

A

Internet Protocol Security
A set of open non proprietary standards used to secure data as it travels across the network or the Internet.
Uses an array of protocols and services to provide data authenticity and integrity, anti replay protection, non repudiation, and protection against eavesdropping and sniffing.
Operates at the Internet layer of the TCP/IP model
Not application dependent.

47
Q

What is iSCSI

A

Internet Small Computer System Interface
A protocol implementing links between data storage networks using IP. Designed to extend across wide area networks without needing any new infrastructure

48
Q

What is a fibre channel

A

A protocol designed to link data storage across a network and provide remote access over large distances.
More expensive option but provides greater performance and reliability
Difficult to implement security controls
Data may be vulnerable to session hijacking and man in the middle attacks

49
Q

What is FCoE

A

Fibre channel over ethernet
Allows traditional fibre channel protocols to use high speed ethernet networks to transmit and store data
Should not be considered a viable alternative for security purposes.

50
Q

Describe telnet

A

A network protocol that allows a client to initiate remote command access to a host over TCP/IP
not encrypted so packets can be intercepted
SSH is more secure remote access protocol

51
Q

Describe NetBIOS

A

Network Basic Inout Output System
An interface that allows applications to properly communicate over different computers in a network.
Three basic functions
Communication over sessions
Connectionless communication using datagrams
Name registration

Attackers can exploit NetBIOS by obtaining info about a system including registered name, IP addresses, and OS.
Harden against attack by implementing strong password policies, limit root access on a network share and disable null session capability

52
Q

Name the 6 file transfer protocols

A

FTP. file transfer protocol. Protocol enables transfer of files between a users workstation and a remote host
SFTP. simple FTP. An early unsecured FTP that is obsolete
TFTP. trivial FTP. very limited protocol used as an automated process of configuring boot files between machines. Offers no security. Used in local networks not on the Internet
FTP over SSH. aka secure FTP uses an SSH tunnel as encryption method
SCP. Secure Copy Protocol. Uses SSH to securely transfer files on Unix systems.
FTPS. File Transfer Protocol Secure. Known as FTP-SSL. combines the used of FTP with support for SSL/TLS

53
Q

Ports

A

Well known

54
Q

What is rule-based management

A

The use of operational rules or restrictions to govern the security of an organizations infrastructure
Incorporated into organizational polices disseminates throughout the org

55
Q

methods organizations use to secure the networking infrastructure

A
Flood guard
Loop protection
Port security 
Secure router configuration 
MAC limiting 
MAC filtering
Network separation
VLAN management 
implicit deny
Log analysis
56
Q

What is flood guarding

A

Security method Tool used to protect resources from flooding attacks such as DDoS distributed denial of service attacks

57
Q

What is loop protection

A

A security method that applies proper router configurations

Ex STP

58
Q

What is port security

A

A security method where admin properly securing ports on a network. Disable unnecessary services
Closing ports open by default or have limited functionality
Regularly apply appropriate patches
Hide responses from ports indicating their status and allow access to pre configured connections only.

59
Q

What is security method of secure router configuration

A

Ensuring all routers on the network are properly secured and configured.

60
Q

What is MAC Limiting security method

A

Defining how many different MAC addresses may connect to the network device

61
Q

What is MAC filtering security method

A

Allowing or denying devices with certain MAC Addresses to connect to a network. Whitelist or blacklist

62
Q

What is network separation security method

A

Splitting hour network into two or more logically separated networks helps separate critical network functions from lower priority functions

63
Q

What is VLAN management security method

A

VLAN configuration can be complicated. Use diagrams and documentation to manage security measures

64
Q

What is Implicit deny security methods

A

Use the principle of implicit deny so that the firewall blocks any traffic it doesn’t recognize.

65
Q

What is log analysis security method

A

Regular monitoring and analysis of security logs helps detects unauthorized intrusion attempts on the network

66
Q

What is unified threat management

A

UTM
Refers to a system that centralizes various security techniques: firewall, anti malware, network intrusion prevention, URL filtering, content inspection, malware inspection into a single appliance
Includes single console a security admin can monitor and manage various defense settings.
Creates the potential for a single point of failure that could affect an entire network
Too much network activity can cause latency issues.

67
Q

The two main categories of antennas

A

Omni directional send and receive radio waves from all directions
Directional transmit signals to a specific point

68
Q

The main two types of omni directional antennas

A

Rubber duck. Small antenna sealed in a rubber jacket. Have little gain mi deal for mobility. Often used in walkie talkies or other two way radios and short range wireless networks

Ceiling dome. Installed in ceilings and used to cover rooms in a building with a wireless signal

69
Q

The four types of directional antennas

A

Yagi. Used in radio but also employed in long distance wireless networking to extend the range of hotspots.

Parabolic. Precise antenna used in satellite dishes. Has significant amount of gain but more difficult to establish a connection

Backfire. Small antenna looks similar to parabolic dish but with less gain. Target a specific physical area without overextending coverage

Cantenna. Homemade antenna that extends wireless networks or help discover them. Involve placing a metal can over another antenna to increase gain

70
Q

There are various 802.11 standards with different characteristics

A

802.11 IEEE standard for wireless LAN communications between wireless devices. Specifies wireless data transfer rates up to 2 Mbps in the 2.4 GHz frequency band

  1. 11a
  2. 11b first called wi-fi. Least expensive.
  3. 11g faster. Improvement on b
  4. 11n even faster. Improvement on g moved to 5GHz
  5. 11ac improves on n. wider channels in 5GHz
71
Q

List the security protocols often used in wireless networking

A
WEP Wired Equivalent Privacy. 
WTLS Wireless Transport Layer Security
802.1x
WPA/WPA2 Wi-Fi Protected Access
EAP Extensible Authentication Protocol ; PEAP Protected EAP & LEAP Lightweight EAP
72
Q

Describe WAP

A

Wireless Application Protocol
Designed to transmit data such as web pages, email, and newsgroup postings to and from wireless devices over long distances.
Uses proprietary WML Wireless Markup Language
Has five layers. wireless application environment, Wireless Session Protocol, Wireless Transport Protocol, WTLS, and Wireless Datagram Protocol.

73
Q

Open wireless networks are a major security risk when accessed directly so you should do what to prevent attackers from stealing your data

A

Use a VPN to tunnel through the network. VPNs provide authentication techniques and encrypts your data in transit over the Internet. The VPN must use secure tunneling protocols such as IPSec as opposed to PPTP

74
Q

What are captive portals

A

A technique that requires a client attempting to connect to the Internet to authenticate through a web page. Unless the client opens the web page and completes the step their packets are intercepted and will be unable to properly use the Internet.
Commonly used by wifi hotspots.

75
Q

What are site surveys

A

The collection of information on a location including access routes, potential obstacles and best positioning of materials for the purpose of constructing something in the best possible way.
Lead to networks and users having quality coverage and bandwidth while being conscious of security protocols and requirements
Accomplished by modeling the proposed environment using tools that collect FR signal data