Module 2 - 03-2 Flashcards

System identification

1
Q

Define Firewall

A

A network security device that monitors traffic to and from your network.

It either allows traffic or it blocks it based on a defined set of security rules. A firewall can use port filtering, which blocks or allows certain port numbers to limit unwanted communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Port Filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are a few different kinds of Firewalls?

A
  • Hardware firewall
  • Software firewall (NVA)
  • Cloud-based firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe a Hardware firewall

A

A hardware firewall is considered the most basic way to defend against threats to a network. A hardware firewall inspects each data packet before it’s allowed to enter the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a Software firewall

A

A software firewall performs the same functions as a hardware firewall, but it’s not a physical device. Instead, it’s a software program installed on a computer or on a server. If the software firewall is installed on a computer, it will analyze all the traffic received by that computer. If the software firewall is installed on a server, it will protect all the devices connected to the server. A software firewall typically costs less than purchasing a separate physical device, and it doesn’t take up any extra space. But because it is a software program, it will add some processing burden to the individual devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does NVA stand for?

A

Network Virtual Appliances (NVA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a Cloud-based firewall

A

Organizations may choose to use a cloud-based firewall. Cloud service providers offer firewalls as a service, or FaaS, for organizations. Cloud-based firewalls are Software firewalls hosted by a cloud service provider. Organizations can configure the firewall rules on the cloud service provider’s interface, and the firewall will perform security operations on all incoming traffic before it reaches the organization’s onsite network. Cloud-based firewalls also protect any assets or processes that an organization might be using in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two main categories of firewalls?

A
  • Stateful
  • Stateless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Stateful

A

A class of firewall that keeps track of information passing through it and proactively filters out threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Stateless

A

A class of firewall that operates based on predefined rules and does not keep track of information from data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe a Stateful Firewall

A

A stateful firewall analyzes network traffic for characteristics and behavior that appear suspicious and stops them from entering the network.

Unlike stateless firewalls, which require rules to be configured in two directions, a stateful firewall only requires a rule in one direction. This is because it uses a “state table” to track connections, so it can match return traffic to an existing session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe a Stateless Firewall

A

A stateless firewall only acts according to preconfigured rules set by the firewall administrator. The rules programmed by the firewall administrator tell the device what to accept and what to reject. A stateless firewall doesn’t store analyzed information. It also doesn’t discover suspicious trends like a stateful firewall does. For this reason, stateless firewalls are considered less secure than stateful firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does NGFW stand for?

A

Next Generation FireWall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe an NGFW

A

A next generation firewall, or NGFW, provides even more security than a stateful firewall. Not only does an NGFW provide stateful inspection of incoming and outgoing traffic, but it also performs more in-depth security functions like deep packet inspection and intrusion protection. Some NGFWs connect to cloud-based threat intelligence services so they can quickly update to protect against emerging cyber threats.

NGFWs can inspect traffic at the application layer of the TCP/IP model and are typically application aware. Unlike traditional firewalls that block traffic based on IP address and ports, NGFWs rules can be configured to block or allow traffic based on the application. Some NGFWs have additional features like Malware Sandboxing, Network Anti-Virus, and URL and DNS Filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are benefits of next generation firewall (NGFW)

A
  • Deep packet inspection
    (a kind of packet sniffing that examines data packets and takes actions if threats exist)
  • Intrusion protection
  • Threat intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which class of firewall operates based on predefined rules and does not keep track of information from data packets?

  • Stateful
  • Stateless
  • Cloud-based
  • NGFW
A

Stateless

Stateless firewalls are a class of firewall that operates based on predefined rules and does not keep track of information from data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does VPN stand for?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define VPN

A

A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you’re using a public network like the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe a VPN

A

VPNs also encrypt your data as it travels across the internet to preserve confidentiality. A VPN service performs encapsulation on your data in transit.

Encapsulation is a process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

The MAC and IP address of the destination device is contained in the header and footer of a data packet. This is a security threat because it shows the IP and virtual location of your private network. You could secure a data packet by encrypting it to make sure your information can’t be deciphered, but then network routers won’t be able to read the IP and MAC address to know where to send it to. This means you won’t be able to connect to the internet site or the service that you want. Encapsulation solves this problem while still maintaining your privacy.

VPN services encrypt your data packets and encapsulate them in other data packets that the routers can read. This allows your network requests to reach their destination, but still encrypts your personal data so it’s unreadable while in transit. A VPN also uses an encrypted tunnel between your device and the VPN server. The encryption is unhackable without a cryptographic key, so no one can access your data.

VPN services are simple and offer significant protection while you’re on the internet. With a VPN, you have the added assurance that your data is encrypted, and your IP address and virtual location are unreadable to malicious actors.

Please note that most websites today use HTTPS. This encrypts the data being transferred between your device and the website. This makes it harder to intercept personal information even if internet traffic can be seen. A VPN encrypts all your internet traffic which helps protect your privacy.

Enterprises and other organizations use VPNs to help protect communications from users’ devices to corporate resources. Some of these resources include servers or virtual machines that host business applications.

Individuals also use VPNs to increase personal privacy. VPNs protect user privacy by concealing personal information, including IP addresses, from external servers.

A reputable VPN also minimizes its own access to user internet activity by using strong encryption and other security measures. Organizations are increasingly using a combination of VPN and SD-WAN capabilities to secure their networks.

VPNs provide a server that acts as a gateway between a computer and the internet. This server creates a path similar to a virtual tunnel that hides the computer’s IP address and encrypts the data in transit to the internet. The main purpose of a VPN is to create a secure connection between a computer and a network. Additionally, a VPN allows trusted connections to be established on non-trusted networks. VPN protocols determine how the secure network tunnel is formed. Different VPN providers provide different VPN protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does SD-WAN stand for?

A

Software-defined wide area network (SD-WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define SD-WAN

A

A virtual WAN service that allows organizations to securely connect users to applications across multiple locations and over large geographical distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ is a process performed by a VPN service that protects data in transit by wrapping sensitive data in other data packets.

  • HTTPS
  • Encapsulation
  • NGFW
  • Address Resolution Protocol (ARP)
A

Encapsulation

A VPN service performs encapsulation to protect data in transit. Encapsulation protects data by wrapping it in other data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define Security zone

A

A segment of a network that protects the internal network from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define Network segmentation

A

A security technique that divides the network into segments.

Each network segment has its own access permissions and security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe Security zone

A

Security zones control who can access different segments of a network. Security zones act as a barrier to internal networks, maintain privacy within corporate groups, and prevent issues from spreading to the whole network.

Additionally, an organization’s network can be divided into subnetworks, or subnets, to maintain privacy for each department in an organization.

27
Q

What two types of security zones can an organization’s network be classified as?

A
  • Uncontrolled zone
  • Controlled zone
28
Q

Define Uncontrolled zone

A

Any network outside of the organization’s control

29
Q

Define Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

30
Q

How many types of networks are within the Controlled Zone?

31
Q

What types of networks are within the Controlled Zone?

A
  • Demilitarized zone (DMZ)
  • Internal network
  • Restricted zone
32
Q

What does DMZ stand for?

A

Demilitarized zone (DMZ)

33
Q

Describe DMZ

A

On the outer layer is the demilitarized zone, or DMZ, which contains public-facing services that can access the internet.

This includes web servers, proxy servers that host websites for the public, and DNS servers that provide IP addresses for internet users. It also includes email and file servers that handle external communications. The DMZ acts as a network perimeter to the internal network.

34
Q

Describe Internal network

A

The internal network contains private servers and data that the organization needs to protect. Inside the internal network is another zone called the restricted zone.

35
Q

Describe Restricted zone

A

The restricted zone protects highly confidential information that is only accessible to employees with certain privileges.

36
Q

Which of the following areas are in the controlled zone? Select all that apply.

  • Uncontrolled zone
  • Restricted zone
  • Internal network
  • Demilitarized zone (DMZ)
A
  • Restricted zone
  • Internal network
  • Demilitarized zone (DMZ)

The DMZ, internal network, and restricted zones are all within the controlled zone.
The restricted zone protects highly confidential information that is only accessible to employees with certain privileges.
The internal network contains private servers and data that the organization needs to protect.
The DMZ contains public-facing services that can access the internet.

37
Q

Describe the structure of a Controlled Zone

A

Ideally, the DMZ is situated between two firewalls. One of them filters traffic outside the DMZ, and one of them filters traffic entering the internal network. This protects the internal network with several lines of defense. If there’s a restricted zone, that too would be protected with another firewall. This way, attacks that penetrate into the DMZ network cannot spread to the internal network, and attacks that penetrate the internal network cannot access the restricted zone.

38
Q

Define Subnetting

A

The subdivision of a network into logical groups called subnets

39
Q

Describe Subnetting

A

It works like a network inside a network.
Subnetting divides up a network address range into smaller subnets within the network. These smaller subnets form based on the IP addresses and network mask of the devices on the network.
Subnetting creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same subnet communicate with each other, the switch changes the transmissions to stay on the same subnet, improving speed and efficiency of the communications.

40
Q

What does CIDR stand for?

A

Classless Inter-Domain Routing (CIDR)

41
Q

Define CIDR

A

A method of assigning subnet masks to IP addresses to create a subnet

42
Q

Describe CIDR

A

Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses.

CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address; This extra number is called the IP network prefix.

For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks.

43
Q

What are the security benefits of subnetting?

A

Subnetting allows network professionals and analysts to create a network within their own network without requesting another network IP address from their internet service provider. This process uses network bandwidth more efficiently and improves network performance. Subnetting is one component of creating isolated subnetworks through physical isolation, routing configuration, and firewalls.

44
Q

Define Proxy server

A

A server that fulfills the request of a client by forwarding them on to other servers

45
Q

Describe Proxy server

A

The proxy server is a dedicated server that sits between the internet and the rest of the network. When a request to connect to the network comes in from the internet, the proxy server will determine if the connection request is safe. The proxy server uses a public IP address that is different from the rest of the private network. This hides the private network’s IP address from malicious actors on the internet and adds a layer of security.

Let’s examine how this will work with an example. When a client receives an HTTPS response, they will notice a distorted IP address or no IP address rather than the real IP address of the organization’s web server. A proxy server can also be used to block unsafe websites that users aren’t allowed to access on an organization’s network.

A proxy server uses temporary memory to store data that’s regularly requested by external servers. This way, it doesn’t have to fetch data from an organization’s internal servers every time. This enhances security by reducing contact with the internal server.

Proxy servers utilize network address translation (NAT) to serve as a barrier between clients on the network and external threats.

Some proxy servers can also be configured with rules, like a firewall.

46
Q

What are different types of Proxy servers?

A
  • Forward proxy server
  • Reverse proxy server
47
Q

Define Forward proxy server

A

Regulates and restricts a person with access to the internet

Handle queries from internal clients when they access resources external to the network

48
Q

Define Reverse proxy server

A

Regulates and restricts the internet access to an internal server

Handle requests from external systems to services on the internal network

49
Q

Describe Forward proxy server

A

The goal is to hide a user’s IP address and approve all outgoing requests. In the context of an organization, a forward proxy server receives outgoing traffic from an employee, approves it, and then forwards it on to the destination on the internet.

50
Q

Describe Reverse proxy server

A

The goal is to accept traffic from external parties, approve it, and forward it to the internal servers. This setup is useful for protecting internal web servers containing confidential data from exposing their IP address to external parties.

51
Q

Describe Email proxy server

A

An email proxy server is another valuable security tool. It filters spam email by verifying whether a sender’s address was forged. This reduces the risk of phishing attacks that impersonate people known to the organization.

52
Q

A(n) _____ regulates and restricts the internet’s access to an internal server.

  • email proxy server
  • reverse proxy server
  • forward proxy server
  • virtual private network (VPN)
A

reverse proxy server

A reverse proxy server regulates and restricts the internet’s access to an internal server.

53
Q

What monitors and filters traffic coming in and out of a network?

  • Uncontrolled zone
  • Firewall
  • Forward proxy server
  • Domain name system (DNS)
A

Firewall

A firewall monitors and filters traffic coming in and out of a network. It either allows or denies traffic based on a defined set of security rules.

54
Q

Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.

  • True
  • False
A

False

Stateful is a class of firewall that keeps track of information passing through it and proactively filters out threats. Stateless operates based on predefined rules and does not keep track of information from data packets.

55
Q

Encapsulation can be performed by a _____ to help protect information by wrapping sensitive data in other data packets.

  • security zone
  • proxy server
  • firewall
  • VPN service
A

VPN service

Encapsulation can be performed by a VPN service to help protect information by wrapping sensitive data in other data packets. VPNs change a public IP address and hide a virtual location to keep data private when using a public network.

56
Q

Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?

  • Demilitarized zone (DMZ)
  • Restricted zone
  • Uncontrolled zone
  • Management zone
A

Restricted zone

The restricted zone protects highly confidential information that only people with certain privileges can access. It typically has a separate firewall.

57
Q

A security analyst uses a _____ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.

  • port filter
  • controlled zone
  • forward proxy server
  • reverse proxy server
A

reverse proxy server

A security analyst uses a reverse proxy server to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.

58
Q

What are two types of VPNs?

A
  • Remote access
  • Site-to-site
59
Q

Describe Remote access VPNs

A

Individual users use remote access VPNs to establish a connection between a personal device and a VPN server. Remote access VPNs encrypt data sent or received through a personal device. The connection between the user and the remote access VPN is established through the internet.

60
Q

Describe Site-to-site VPNs

A

Enterprises use site-to-site VPNs largely to extend their network to other networks and locations. This is particularly useful for organizations that have many offices across the globe. IPSec is commonly used in site-to-site VPNs to create an encrypted tunnel between the primary network and the remote network. One disadvantage of site-to-site VPNs is how complex they can be to configure and manage compared to remote VPNs.

61
Q

What are two VPN protocols?

A
  • WireGuard VPN
  • IPSec VPN

A VPN protocol is similar to a network protocol: It’s a set of rules or instructions that will determine how data moves between endpoints.

WireGuard and IPSec are two different VPN protocols used to encrypt traffic over a secure network tunnel. The majority of VPN providers offer a variety of options for VPN protocols, such as WireGuard or IPSec. Ultimately, choosing between IPSec and WireGuard depends on many factors, including connection speeds, compatibility with existing network infrastructure, and business or individual needs.

62
Q

Define Endpoint

A

An endpoint is any device connected on a network.

Some examples of endpoints include computers, mobile devices, and servers.

63
Q

Describe WireGuard VPN

A

WireGuard is a high-speed VPN protocol, with advanced encryption, to protect users when they are accessing the internet. It’s designed to be simple to set up and maintain. WireGuard can be used for both site-to-site connection and client-server connections. WireGuard is relatively newer than IPSec, and is used by many people due to the fact that its download speed is enhanced by using fewer lines of code. WireGuard is also open source, which makes it easier for users to deploy and debug. This protocol is useful for processes that require faster download speeds, such as streaming video content or downloading large files.

64
Q

Describe IPSec VPN

A

IPSec is another VPN protocol that may be used to set up VPNs. Most VPN providers use IPSec to encrypt and authenticate data packets in order to establish secure, encrypted connections. Since IPSec is one of the earlier VPN protocols, many operating systems support IPSec from VPN providers.

Although IPSec and WireGuard are both VPN protocols, IPSec is older and more complex than WireGuard. Some clients may prefer IPSec due to its longer history of use, extensive security testing, and widespread adoption. However, others may prefer WireGuard because of its potential for better performance and simpler configuration.