Lesson 3.3 given a scenario, implement secure network designs Flashcards

1
Q

What is an Extranet

A

A zone created to allow authorized users access to company assets separate from the intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a intranet?

A

An internal company zone established to allow employees the ability to share content and communicate more effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Demilitarized Zone (DMZ)

A

area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a VLAN?

A

a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer, and group users according to departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Loss Prevention (DLP)

A

prevent the removing or sending of protected information, but it cannot scan for malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Unified Threat Management (UTM)

A

an all-in-one security appliance that combines the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, Data Loss Prevention, content filtering, and many more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is firewall?

A

a software or hardware device that protects a system or network by blocking unwanted network traffic. It is not designed to scan for malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does a virtual ip address do

A

ensures a smooth transition over to the secondary load balancer if the primary fails. Users or other services will only need to know one destination IP address to reach the web server farm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe an active/passive technology

A

ensure a proper failure capability. Requests will continually flow through one load balancer and through the secondary if the primary fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Bridged Protocol Data Unit (BPDU) guard

A

guard setting is applied to switches. This causes a portfast-configured port that receives a BPDU to become disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe east-west traffic

A

describes the network and platform configurations that support cloud and other Internet services where most traffic is actually between servers within the data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe zero trust

A

uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise. It can use micro-segmentation to apply security policies to single node like it was in its own zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is something you can do to improve video quality and overall use of the network bandwidth

A

Switches that support quality of service use the 802.1p header to prioritize frames. This will improve video conferences and make efficient use of the overall network bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Out of Band management

A

a means of remote management of a system; a term commonly used when managing network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Always on VPN

A

allow for a continued connection between the geographically separated servers and the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access VPN

A

allow an authorized user to connect to an internal network from a remote location. Tunneling protocols encapsulate and encrypt traffic for data protection and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VPN concentrator

A

incorporates the most advanced encryption and authentication techniques and includes all of the items necessary to create a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Site-to-site VPN

A

connects multiple networks versus one. Remote users can access both locations as if they were onsite without noticing the location separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a jump server

A

runs only necessary administrative applications to securely access a web server, for example, in the DMZ. This minimizes any inherit risks when connecting to the DMZ from a secure zone

20
Q

Gateway Load Balancing Protocol (GLBP)

A

runs only necessary administrative applications to securely access a web server, for example, in the DMZ. This minimizes any inherit risks when connecting to the DMZ from a secure zone

21
Q

Common Address Redundancy (CARP)

A

another commonly used network protocol that works in the same way as GLBP.

22
Q

What is an agentless health or posture

A

supports a wide range of devices, such as smartphones and tablets, but less detailed information about the client is available.

23
Q

What is a non-persistent or dissolvable agent

A

loaded into memory and never installed on the system. This option still requires an agent that may not be compatible with mobile devices.

24
Q

What is a quarantine network

A

a restricted network that uncompliant devices are redirected to, only after it has been assessed. A policy for mobile devices must be in place for proper remediation to take place

25
Q

Layer does a network-based firewall analyze packets at

A

Layer 2

26
Q

What is another name for application firewall

A

stateful multilayer inspection firewall

27
Q

What is a scheduling algorithm

A

the code and metrics that determine which node is selected for processing each incoming request. The simplest scheduling is round robin; this just means picking the next node.

28
Q

active/ passive configuration

A

sends all requests to one node while the other node is on standby. The secondary node takes over services when the primary node loses connectivity or goes offline

29
Q

persistence settings

A

allow an application-layer load balancer to keep clients connected to a session. This is achieved with a cookie at the client.

30
Q

Lightweight Directory Access Protocol Secure (LDAPS)

A

Uses port 636 to setup a secure channel to a directory service using a digital certificate

31
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

uses port 443 to connect clients to a web server or service using digital certificates. HTTPS is commonly secured using the transport layer security (TLS)

32
Q

Secure Multipart Internet Message Extensions (S/MIME)

A

is used to sign and encrypt mail messages using an email certificate.

33
Q

Encapsulation Security Payload (ESP)

A

provides confidentiality and/or authentication and integrity. ESP is used with Internet Protocol Security (IPSec) over layer 3 of the Open Systems Interconnection (OSI) model

34
Q

Secure Post Office Protocol v3 (POP3)

A

is a mailbox protocol designed to allow mail to be stored on a server and downloaded to the recipient’s email client at their convenience.

35
Q

Secure Internet Message Access Protocol v4 (IMAP4)

A

is designed for dial-up access. The client contacts the server to download its messages, then disconnects. IMAP supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously. Messages are stored and organized on the server.

36
Q

Simple Mail Transfer Protocol (SMTP)

A

specifies how mail is delivered from one system to another.

37
Q

Secure Multipurpose Internet Mail Extensions (S/MIME)

A

the user is issued a digital certificate containing a public key that is signed by a Certificate Authority to establish validity.

38
Q

Transport Layer Security (TLS) 1.2

A

added support for the strong Secure Hash Algorithm (SHA)-256 cipher. That is the primary difference between TLS 1.1 and TLS 1.2.

39
Q

Secure Sockets Layer (SSL) 3.0

A

is less secure than any of the TLS versions and does not support SHA-256 cipher

40
Q

TLS 1.1

A

added the improvement to the cipher suite negotiation process and protection against known attacks but does not support the SHA-256 cipher.

41
Q

SSL 2.0

A

is deprecated and should only be deployed when subject to risk assessments. This version does not support the SHA-256 cipher

42
Q

Simple Network Management Protocol (SNMP) v3

A

supports encryption and strong user-based authentication. Instead of community names, the agent is configured with a list of usernames and access permissions

43
Q

SNMPv1

A

uses community names that are sent in plaintext and should not be transmitted over the network if there is any risk they could be intercepted.

44
Q

SNMPv2c

A

also uses community names that are sent in plaintext and should not be transmitted over the network, if there is any risk they could be intercepted. Like SNMPv1, this protocol does not support strong user-based authentication

45
Q

Management Information Base (MIB)

A

is the database that the SNMP agent uses. The agent is a process that runs on a switch, router, server, or SNMP compatible network device.