Módulo 05 - Network Architecture Flashcards
Módulo 05
Define:
Network infraestructure
It’s the media, appliances and protocols that support connectivity.
Acronym:
OSI
Open System Interconnection
What are the OSI model layers?
- Physical
- Data-link
- Network
- Transport
- Session
- Presentation
- Application
For CompTIA, consider only 1, 2, 3, 4 and 7
Acronym:
MAC
Media Access Control
Define:
MAC Address
Layer 2 component, attached to the hosts.
Used as an identifier, and is a 48-bit string
Types of node in a network
Intermediary nodes => Forward traffic of a network to other hosts
Host nodes => Initiates the communication in a network
What are the OSI layers that refers to:
- Switches
- Routers
- Transport Protocols
- Layer 2, because it uses MAC addresses
- Layer 3, because it uses IP address
- Layer 4, because it uses network protocols such as TCP, or UDP
In network terms, define what would be:
- Preventative controls
- Detective controls
- Preventative, detective, and corrective controls
- Placed at the border of a network, such as firewalls or Load Balancers
- Implemented to monitor the traffic, generates alerts in malicious traffic
- Installed on hosts, such EDR
What is a passive security control?
A control that operates without requiring any client configuration
What is an active security control?
A control requiring credentials, access permissions, and interaction with target hosts, often involving agent software or gateway configuration.
What does “inline” mean for a security device?
A device deployed within the cable path, without requiring changes to IP or routing topology, and typically without MAC or IP addresses.
What are two methods for deploying network traffic sniffing controls?
- SPAN (switched port analyzer)/mirror port.
- Test access point (TAP).
What is a SPAN or mirror port?
A switch-configured port that copies frames from other ports for monitoring but may drop frames under heavy load.
What is a TAP (test access point)?
A device inline with network cabling that physically copies signals to a monitor port without logic-based decisions.
What is a fail-open and fail-close mode?
Fail-open is a failure state where access is not blocked, whether fail-close is where access is blocked
Acronym:
SPAN
Switched Port Analyzer
What is the difference between TAP and SPAN regarding reliability?
TAP reliably copies all frames, while SPAN may miss frames with errors or drop them under heavy load.
Define:
Proxy server
Acts as an intermediary for clients, providing traffic management, anonymity, content filtering, and caching.
Define:
Jump server
Hardened server controlling access to isolated systems, enhancing security.
Define:
Load balancer
Distributes network traffic across servers, provides fault tolerance, and may include WAF for attack protection.
List:
Types of load balancers
- Layer 4 (Transport layer decisions).
- Layer 7 (Application-level data decisions).
Define:
Sensor
A packet sniffer used to capture traffic, often feeding an IDS for malicious traffic detection.
Define:
IDS
Intrusion Detection System identifies threats without blocking traffic.
Define:
All-in-one security appliance
Device combining functions like firewall, IDS, IPS, URL filtering, and spam filtering into one.
Define:
Web filtering
Blocks malicious/inappropriate websites using criteria like URL, IP, or keywords.
Define:
Content filtering server
Denies or allows website access based on allow/deny lists or content categories.
List:
Web filtering approaches
Agent-based.
Centralized proxy.
Define:
DNS filtering
Controls website access by managing domain name resolution, blocking malicious or unapproved sites.
List:
DNS filtering benefits
Blocks phishing and malware sites.
Enforces acceptable use policies.
Protects all network devices, including IoT.
Define:
Security Zone
Security zones are portions of the network or system that have specific security concerns or requirements.
List:
Types of network
Wireless
Guest
Honeynet
Ad hoc
List:
Security Zone Types
Screened subnets
Intranet
Extranet
Wireless
Define:
Screened subnets
A perimeter network separating public-facing servers from internal resources to reduce exposure to threats.
DMZ
Define:
Intranet
Internal LAN - Local Access Network
Define:
Extranet
An extranet is a private LAN distinct from the intranet.
Often used to grant resource access to business partners.
Define:
Honeypot
Decoy system designed to attract attackers, monitor their activity, and gather intelligence about their tactics.
List:
Types of honeypots
Honeyfile
Honeyspot
Honeynet
Honeytoken
Define:
Honeynet
A decoy network with multiple honeypots used to gather information about attacks and strengthen defenses.
Define:
Honeyfile
A decoy file designed to lure attackers, trigger alarms, and gather intelligence when accessed.
List:
Common types of honeyfiles
Information files (e.g., passwords.txt).
Application files (e.g., compilers).
Log files.
Intellectual property files.
Define:
Honeytoken
False credentials or data used to distract attackers, trigger alerts, and gather intelligence.
Define:
DNS sinkhole
A DNS record that redirects malicious traffic to a controlled IP address to block bots and prevent DDoS attacks.
List:
Limitations of DNS sinkholes
The use of non-organizational DNS servers.
May restrict legitimate websites.
Define:
Fake telemetry
Deceptive strategy returning spoofed data to network probes to mislead attackers and track their actions.
List:
Benefits of fake telemetry
Distracts attackers.
Tracks techniques and tools used.
Tunes defenses like firewalls and intrusion detection systems.
List:
Q: Key features of a screened subnet
Hosts public services (e.g., web, email, DNS, FTP).
Isolates internal resources from public systems.
Uses two firewalls for traffic control.
Define:
Q: Bastion host
A hardened host exposed to attacks, often serving as a sacrificial host or firewall.
Define:
Q: Screening router
The most external router using ACLs to filter packets, often doubling as a firewall.
Define:
Q: Dual-homed gateway
A firewall with three interfaces connecting the internet, public subnet, and private network, with IP forwarding disabled.
Define:
Q: Screened-host gateway
A gateway in the screened subnet requiring authentication to access its resources or the intranet.
Define:
Q: Two-firewall screened subnet
A setup with two firewalls where the external firewall manages public access and the internal firewall protects private networks.
List:
Q: Common practices for firewall packet filters in screened subnets
Close all ports by default.
Open only necessary ports.
Use a VPN server for internet access.