Module 9: Infrastructure Security Flashcards

1
Q

What are Mitigation Principles?

A

Methods used to reduce vulnerability and prevent security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Gap Analysis?

A

Evaluating an organization’s security posture against desired industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Segmentation?

A

The process of dividing a network into multiple subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Isolation?

A

Keeping instances of attack surfaces separate so it can only affect itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Least Privilege?

A

Granting the minimum level of access needed to perform tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Configuration Enforcement?(Related to Security Measures)

A

Applying security measures to reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Decommissioning?

A

Remove a service from a live production environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Removal of unnecessary software?(Related to Attack Vectors)

A

Deleting non-essential software to eliminate an attack vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Selection of Effective Controls? (Related to Countermeasures)

A

The process of choosing countermeasures to reduce an asset’s risk to exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Device Placement?

A

Physically locating a device in a secure location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the benefits of using standard networking devices with hardware designed for security?

A

It creates a layered security approach and makes it harder for attackers to access that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hardening Targets?

A

Configuring and securing a device to prevent attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OSI stand for?

A

Open Systems Interconnection Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does PDU stand for?

A

Protocol Data Units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Switch?

A

Connects multiple devices to a Local Area Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer does a Switch operate at?

A

The Data Link Layer
The second layer

17
Q

How do Switches manage MAC Addresses?

A

By dynamically creating and maintaining the MAC Address table.

18
Q

What is a Hub?

A

An early network device that connected multiple devices within a LAN. It operated at the physical layer (Layer 1)

19
Q

What is a MAC Flooding Attack?

A

When a Threat Actor floods a Switch with spoofed Ethernet packets

20
Q

What is Port Security?

A

Limiting the amount of MAC addresses that can be learned on a Network Switch Port.

21
Q

What is a Router?

A

Forwards data packets across networks to their destinations.

22
Q

What layer does a Router operate at?

A

A Router operates at the Network Layer (Layer 3 in the OSI Model).

23
Q

What is a Server?

A

Software or Hardware that distributes resources and services upon request.

24
Q

What is a Load Balancer?

A

A device that helps evenly distribute work across a network.

25
What two categories are Load Balancers grouped into?
Layer 4(Transport Layer) Load Balancers & Layer 7(Application Layer)
26
What is a Firewall?
Monitors incoming and outgoing traffic.
27