Lesson 14: Supporting and Troubleshooting Secure Networks Flashcards

1
Q

Define network segmentation enforcement

A

Enforcing a security zone by separating a segment of the network from access by the rest of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is network segmentation enforcement performed?

A

Using firewalls, VPNs, and VLANs to separate broadcast domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a (security) zone?

A

A zone is an area of the network where the security configuration is the same for all hosts within it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define an internet-facing host

A

A host that accepts inbound connections from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a perimeter network zone

A

An area of a network that traffic can’t pass through directly enabling external clients access to data on private systems (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of servers are in a perimeter network zone?

A

Web servers, application servers, ftp servers, mail servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a perimeter network (DMZ) typically configured?

A

As a secured boundary between the internet and a private network with two firewalls placed on each side of the perimeter network zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an edge firewall in perimeter network/DMZ?

A

To restrict traffic on the external/public interface and allows permitted traffic to the hosts in the perimeter network zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a choke firewall/point in a perimeter network?

A

Servers as an internal firewall to filter communications between hosts in the perimeter network and hosts in the LAN network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define a screened network/Triple Homed Firewall

A

A network containing one firewall with three network network interaces - one to the internet, one to the DMZ, and another to the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a firewall?

A

Software or hardware device that processes traffic according to set rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a packet filtering firewall

A

Earliest type of firewall that is configured with rules in an ACL, packets are processed by filters to determine if they match defined rules and carry out the action associated with the rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the rules a packet filtering firewall can use to filter traffic?

A
  1. Action - Accept/Deny/Drop
  2. Protocol type, routing protocols
  3. Port filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At what layer of the OSI model does a packet filtering firewall operate?

A

Layer 3 (Network layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does is it mean that a packet filtering firewall is stateless?

A

Meaning that it does not preserve information about the connection between two hosts with no record of previously processed packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define a stateful inspection firewall

A

A firewall that maintains stateful information about the session established between two hosts

17
Q

At what layer of the OSI model does a stateful inspection firewall operate?

A

Session layer - layer 5

18
Q

How does a stateful inspection firewall process packets?

A

When a packet arrives, the firewall checks to confirm whether it belongs to an existing connection, if not, the firewall will apply ordinary filtering rules to determine whether to allow it

19
Q

Define a proxy server

A

A system or router that provides a gateway between users and another server to filter and often modify communications

20
Q

What is a forward proxy server?

A

A proxy server for accepting connections from clients on a private network and forwarding those requests to the public internet

21
Q

What is a non-transparent proxy server?

A

A proxy server whose clients must be configured with the proxy server address and the port number to use, typically TCP port 8080

22
Q

What is a transparent proxy server?

A

Proxy server that intercepts client traffic without the clients having to be configured for proxy, and is implemented on a switch/router

23
Q

What is a reverse proxy server?

A

A proxy server for receiving connections from public interfaces and routing them to internal clients

24
Q

Define Network Address Translation (NAT)

A

Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally using an internet facing device

25
Q

What is use of dynamic network address translation (NAT)?

A

Allows for less static 1:1 NAT mappings by using a pool of public IP address that maps to internal IP addresses

26
Q

How does dynamic NAT operate?

A

The NAT service builds a table of public to private address mappings, new sessions creates a new pubic-private address binding in the table, when the session ends, the binding is released for use by another host

27
Q

Define Port Address Translation (PAT)

A

Maps private host IP addresses onto a single public IP address and each host is tracked by assigning it a random high TCP port internally and applies the same port to the external connection

28
Q

Define “defense in depth”

A

Security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attack’s progress so all access attempts are authenticated, authorized, and audited

29
Q

Define Network Access Control (NAC)

A

Term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level

30
Q

What systems/protocols make up Network Access Control (NAC)?

A

EAP, AAA, 802.1X port security

31
Q

Define a honeypot

A

A sacrificial computer system that’s intended to attract cyberattacks, like a decoy. uses their intrusion attempts to gain information about cybercriminals and cyberattacks

32
Q

Define an Intrusion Detection System (IDS)

A

Security appliance or software that uses passive hardware sensors for real-time traffic monitoring on a specific segment of the network

33
Q

How does an IDS function?

A

Uses a sniffer to read frames from a mirrored port and compares them against signature patterns and if a pattern is matched the IDS will alert

34
Q

Where is an IDS positioned in a network?

A

Positioned behind a firewall to detect suspicious traffic that the firewall didn’t block as a form of defense in depth

35
Q

Define an Intrusion Prevention System (IPS)

A

Security appliance or software that combines detection capabilities with functions that can actively block attacks

36
Q

What is a reverse proxy server?

A

A proxy server for receiving connections from public interfaces and routing them to internal clients

37
Q

Where is an IPS positioned in a network?

A

Typically built into firewall appliances, they are in-line with the networking meaning all traffic passes through it

38
Q

What are basic reasons for DHCP failure?

A
  1. DHCP server is offline
  2. No more addresses available in scope
  3. Router doesn’t support specific DHCP protocol
39
Q

What is a rouge DHCP server?

A

An extra DHCP server serving the same scope as the primary, causing clients to potentially obtain the wrong IP configuration