Module 1 Flashcards

1
Q

Reasons for Network Security

A

Network security breaches can

disrupt e-commerce,
cause the loss of business data,
threaten people’s privacy, and
compromise the integrity of information.

These breaches can result in
lost revenue for corporations,
theft of intellectual property,
lawsuits, and
can even threaten public safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

provides comprehensive security and threat intelligence to defend customers and protect their assets.

A

Cisco Talos Intelligence Group website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

responsible for investigating and mitigating potential vulnerabilities in Cisco products.

A

Cisco Product Security Incident Response Team (PSIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An ___ is a path by which a threat actor can gain access to a server, host, or network. _____

originate from inside or outside the corporate network, as shown in the figure.

A

attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An internal user, such as an employee, can accidentally or intentionally:

A

Steal and copy confidential data to removable media, email, messaging software, and other media.

Compromise internal servers or network infrastructure devices.

Disconnect a critical network connection and cause a network outage.

Connect an infected USB drive into a corporate computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ have the potential to cause greater damage than ___ because internal users have direct access to the building and its infrastructure devices. Employees may also have knowledge of the corporate network, its resources, and its confidential data.

A

Internal threats than external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is likely to be an organization’s most valuable asset.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Organizational data can include

A

research and development data,
sales data,
financial data,
human resource and legal data,
employee data,
contractor data, and
customer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world.

A

Data loss, or data exfiltration,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The data loss can result in:

A

Brand damage and loss of reputation
Loss of competitive advantage
Loss of customers
Loss of revenue
Litigation/legal action that results in fines and civil penalties
Significant cost and effort to notify affected parties and recover from the breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Various ____ controls must be implemented that combine strategic, operational, and tactical measures.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data loss vectors are

A

Email/Social Networking
Unencrypted Devices
Cloud Storage Devices
Removable Media
Hard Copy
Improper Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.

A

Email/Social Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A stolen corporate laptop typically contains confidential organizational data. If the data is not stored using an encryption algorithm, then the thief can retrieve valuable confidential data.

A

Unencrypted Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Saving data to the cloud has many potential benefits. However, sensitive data can be lost if access to the cloud is compromised due to weak security settings.

A

Cloud Storage Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another risk is that a USB drive containing valuable corporate data could be lost.

A

Removable Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Corporate data should be disposed of thoroughly. For example, confidential data should be shredded when no longer required. Otherwise, a thief could retrieve discarded reports and gain valuable information.

A

Hard Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Passwords are the first line of defense. Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.

A

Improper Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__ consists of interconnected LANs within a limited geographic area.

A

Campus Area Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Connections to untrusted networks must be checked in-depth by multiple layers of defense before reaching enterprise resources.

A

This is known as defense-in-depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Cisco Integrated Services Router is secured. It protects data in motion that is flowing from the CAN to the outside world by establishing _____. ___ ensure data confidentiality and integrity from authenticated sources.

A

Virtual Private Networks (VPNs). VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

performs stateful packet filtering to filter return traffic from the outside network into the campus network.

A

ASA Firewall

A Cisco Adaptive Security Appliance (ASA) firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

continuously monitors incoming and outgoing network traffic for malicious activity. It logs information about the activity, and attempts to block and report it.

A

IPS

A Cisco Intrusion Prevention System (IPS) device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

These distribution layer switches are secured and provide secure redundant trunk connections to the Layer 2 switches. Several different security features can be implemented, such as ACLs, DHCP snooping, Dynamic ARP Inspection (DAI), and IP source guard.

A

Layer 3 Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

These access layer switches are secured and connect user-facing ports to the network. Several different security features can be implemented, such as port security, DHCP snooping, and 802.1X user authentication.

A

Layer 2 Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

provide advanced threat defense, application visibility and control, reporting, and secure mobility to secure and control email and web traffic.

A

ESA/WSA

A Cisco Email Security Appliance (ESA) and Web Security Appliance (WSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

authenticates users, authorizes what they are allowed to do, and tracks what they are doing.

A

AAA Server

An authentication, authorization, and accounting (AAA) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

End points are secured using various features including antivirus and antimalware software, Host Intrusion Protection System features, and 802.1X authentication features.

A

Hosts

29
Q

physical security

A

fire alarms, sprinklers, seismically-braced server racks, redundant heating, ventilation, and air conditioning (HVAC), and UPS systems are in place to protect people, equipment, and data.

30
Q

data center physical security can be divided into two areas:

A

Outside perimeter security
Inside perimeter security

31
Q

This can include on-premise security officers, fences, gates, continuous video surveillance, and security breach alarms.

A

Outside perimeter security

32
Q

This can include continuous video surveillance, electronic motion detectors, security traps, and biometric access and exit sensors.

A

Inside perimeter security

33
Q

provide access to the data halls where data center data is stored.

is similar to an air lock.

A

Security traps

34
Q

allows organizations to use services such as data storage or cloud-based applications, to extend their capacity or capabilities without adding infrastructure.

A

Cloud computing

35
Q

is the foundation of cloud computing. Without it, cloud computing, as it is most-widely implemented, would not be possible.

A

Virtualization

35
Q

separates the application from the hardware.

A

Cloud computing

36
Q

separates the operating system from the hardware.

A

Virtualization

37
Q

VMs are prone to attacks

A

Hyperjacking
Instant On Activation
Antivirus Storms

38
Q

-An attacker could hijack a VM hypervisor (VM controlling software) and then use it as a launch point to attack other devices on the data center network.

A

Hyperjacking

39
Q
  • When a VM that has not been used for a period of time is brought online, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.
A

Instant On Activation

40
Q
  • This happens when all VMs attempt to download antivirus data files at the same time.
A

Antivirus Storms

41
Q

Cisco Solution to VMs attacks

A

Cisco Secure Data Center solution

42
Q

The core components of the Cisco Secure Data Center solution provide the following services:

A

Secure Segmentation
Threat Defense
Visibility

43
Q

ASA devices and a Virtual Security Gateway integrated into the Cisco Nexus Series switches are deployed in a data center network to provide secure segmentation. This provides granular inter-virtual-machine security.

A

Secure Segmentation

44
Q

ASAs and IPS devices in data center networks use threat intelligence, passive OS fingerprinting, and reputation and contextual analysis to provide threat defense.

A

Threat Defense

45
Q

Visibility solutions are provided using software such as the Cisco Security Manager which help simplify operations and compliance reporting.

A

Visibility

46
Q

To accommodate the BYOD trend, Cisco developed the ___. ___ access to resources can be initiated by users from many locations, on many types of endpoint devices, using various connectivity methods.

A

Borderless Network

47
Q

To support this blurred network edge, Cisco devices support ____. ____ secure, monitor, and manage mobile devices, including corporate-owned devices and employee-owned devices. ____supported and managed devices include not only handheld devices, such as smartphones and tablets, but also laptop and desktop computing devices.

A

Mobile Device Management (MDM) features.

48
Q

Critical functions performed by MDM (Mobile Device Management

A

Data Encryption
PIN Enforcement
Data Wipe
Data Loss Prevention (DLP)
Jailbreak / Root Detection

49
Q

Most devices have built-in ___ capabilities, both at the device and file level. MDM features can ensure that only devices that support ___ and have it enabled can access the network and corporate content.

A

data encryption

50
Q

____ is the first and most effective step in preventing unauthorized access to a device. Furthermore, strong password policies can also be enforced by an MDM, reducing the likelihood of brute-force attacks.

A

Enforcing a PIN lock

51
Q

Lost or stolen devices can be remotely fully- or partially-____, either by the user or by an administrator via the MDM.

A

wiped / data wipe

52
Q

While data protection functions (like PIN locking, data encryption and remote data wiping) prevent unauthorized users from accessing data, __ prevents authorized users from doing careless or malicious things with critical data.

A

Data Loss Prevention (DLP)

53
Q

____ (on Apple iOS devices) and __ (on Android devices) are a means to bypass the management of a device. MDM features can detect such bypasses and immediately restrict a device’s access to the network or other corporate assets.

A

Jailbreaking apple
rooting android

54
Q

The____ network type consists of a number of LANs that are connected together across a limited geographic area.

A

CAN Campus Area Network

55
Q

networks include a consumer grade router with basic security features to protect inside assets from outside attackers.

A

SOHO Small Office and Home Office

56
Q

networks may use high-speed Nexus switches to connect off-site facilities to corporate sites.

A

Data center

57
Q

is a security measure found both inside and outside a data center facility. A gate provides outside perimeter security. Security traps, biometrics access, and exit sensors provide inside perimeter security.

A

Continuous video surveillance

58
Q

can be intentional or accidental and cause greater damage than external threats because the internal user has direct access to the internal corporate network and corporate data.

A

Internal threats

59
Q

are commonly used between corporate sites and between mobile or remote workers that connect to and use resources on the corporate network.

A

VPNs

60
Q

commonly have multiple LANs that have host devices attached. A SOHO topology contains wired and wireless hosts on a limited basis. Data centers and cloud topologies typically do not have PCs.

A

Campus area networks (CANs)

61
Q

The company had a ___network with no subnets. The threat actor was able to access and destroy all kinds of corporate data due to a thermostat that was on the network, but was not scanned as part of the security procedures.

A

flat

62
Q

use a variety of techniques for security including redundant heating, ventilation, and air conditioning (HVAC), UPS systems, fire alarms, sprinklers, video surveillance, electronic motion detectors, security traps, biometric security, security officers, fences, gates, video surveillance, and security breach alarms. Even though cloud-based virtualized servers and network devices may be housed in a data center, protection for cloud computing requires other technologies.

A

Data centers

63
Q

is used to secure, monitor, and manage both corporate-owned and employee-owned devices such as smartphones, tablets, laptops, and desktops.

A

Mobile Device Management (MDM)

64
Q

occurs when an attacker hijacks a virtual machine (VM) hypervisor and then uses that VM to launch an attack on other data center devices.

A

Hyperjacking

64
Q

Data, such as research and development data, sales data, financial data, human resource and legal data, employee data, contractor data, and customer data, is likely to be the ____ for an organization.

A

most valuable asset

65
Q

is popular and has many benefits. However data stored there could be compromised due to weak security settings.

A

Cloud storage

66
Q

A distinguishing factor of campus area networks (CANs) are that they have ___

A

interconnected LANs.