Módulo 05 - Network Architecture Flashcards

Módulo 05

1
Q

Define:
Network infraestructure

A

It’s the media, appliances and protocols that support connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acronym:
OSI

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the OSI model layers?

A
  1. Physical
  2. Data-link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

For CompTIA, consider only 1, 2, 3, 4 and 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acronym:
MAC

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:
MAC Address

A

Layer 2 component, attached to the hosts.

Used as an identifier, and is a 48-bit string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of node in a network

A

Intermediary nodes => Forward traffic of a network to other hosts
Host nodes => Initiates the communication in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the OSI layers that refers to:
- Switches
- Routers
- Transport Protocols

A
  • Layer 2, because it uses MAC addresses
  • Layer 3, because it uses IP address
  • Layer 4, because it uses network protocols such as TCP, or UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In network terms, define what would be:
- Preventative controls
- Detective controls
- Preventative, detective, and corrective controls

A
  • Placed at the border of a network, such as firewalls or Load Balancers
  • Implemented to monitor the traffic, generates alerts in malicious traffic
  • Installed on hosts, such EDR
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a passive security control?

A

A control that operates without requiring any client configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an active security control?

A

A control requiring credentials, access permissions, and interaction with target hosts, often involving agent software or gateway configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does “inline” mean for a security device?

A

A device deployed within the cable path, without requiring changes to IP or routing topology, and typically without MAC or IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are two methods for deploying network traffic sniffing controls?

A
  1. SPAN (switched port analyzer)/mirror port.
  2. Test access point (TAP).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a SPAN or mirror port?

A

A switch-configured port that copies frames from other ports for monitoring but may drop frames under heavy load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a TAP (test access point)?

A

A device inline with network cabling that physically copies signals to a monitor port without logic-based decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a fail-open and fail-close mode?

A

Fail-open is a failure state where access is not blocked, whether fail-close is where access is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Acronym:
SPAN

A

Switched Port Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the difference between TAP and SPAN regarding reliability?

A

TAP reliably copies all frames, while SPAN may miss frames with errors or drop them under heavy load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define:
Proxy server

A

Acts as an intermediary for clients, providing traffic management, anonymity, content filtering, and caching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define:
Jump server

A

Hardened server controlling access to isolated systems, enhancing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define:
Load balancer

A

Distributes network traffic across servers, provides fault tolerance, and may include WAF for attack protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List:
Types of load balancers

A
  1. Layer 4 (Transport layer decisions).
  2. Layer 7 (Application-level data decisions).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:
Sensor

A

A packet sniffer used to capture traffic, often feeding an IDS for malicious traffic detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:
IDS

A

Intrusion Detection System identifies threats without blocking traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:
All-in-one security appliance

A

Device combining functions like firewall, IDS, IPS, URL filtering, and spam filtering into one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define:
Web filtering

A

Blocks malicious/inappropriate websites using criteria like URL, IP, or keywords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define:
Content filtering server

A

Denies or allows website access based on allow/deny lists or content categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

List:
Web filtering approaches

A

Agent-based.
Centralized proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define:
DNS filtering

A

Controls website access by managing domain name resolution, blocking malicious or unapproved sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

List:
DNS filtering benefits

A

Blocks phishing and malware sites.
Enforces acceptable use policies.
Protects all network devices, including IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define:
Security Zone

A

Security zones are portions of the network or system that have specific security concerns or requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

List:
Types of network

A

Wireless
Guest
Honeynet
Ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

List:
Security Zone Types

A

Screened subnets
Intranet
Extranet
Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define:
Screened subnets

A

A perimeter network separating public-facing servers from internal resources to reduce exposure to threats.

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define:
Intranet

A

Internal LAN - Local Access Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define:
Extranet

A

An extranet is a private LAN distinct from the intranet.

Often used to grant resource access to business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define:
Honeypot

A

Decoy system designed to attract attackers, monitor their activity, and gather intelligence about their tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

List:
Types of honeypots

A

Honeyfile
Honeyspot
Honeynet
Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define:
Honeynet

A

A decoy network with multiple honeypots used to gather information about attacks and strengthen defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define:
Honeyfile

A

A decoy file designed to lure attackers, trigger alarms, and gather intelligence when accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

List:
Common types of honeyfiles

A

Information files (e.g., passwords.txt).
Application files (e.g., compilers).
Log files.
Intellectual property files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Define:
Honeytoken

A

False credentials or data used to distract attackers, trigger alerts, and gather intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define:
DNS sinkhole

A

A DNS record that redirects malicious traffic to a controlled IP address to block bots and prevent DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

List:
Limitations of DNS sinkholes

A

The use of non-organizational DNS servers.

May restrict legitimate websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Define:
Fake telemetry

A

Deceptive strategy returning spoofed data to network probes to mislead attackers and track their actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

List:
Benefits of fake telemetry

A

Distracts attackers.
Tracks techniques and tools used.
Tunes defenses like firewalls and intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

List:
Q: Key features of a screened subnet

A

Hosts public services (e.g., web, email, DNS, FTP).
Isolates internal resources from public systems.
Uses two firewalls for traffic control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Define:
Q: Bastion host

A

A hardened host exposed to attacks, often serving as a sacrificial host or firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Define:
Q: Screening router

A

The most external router using ACLs to filter packets, often doubling as a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define:
Q: Dual-homed gateway

A

A firewall with three interfaces connecting the internet, public subnet, and private network, with IP forwarding disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Define:
Q: Screened-host gateway

A

A gateway in the screened subnet requiring authentication to access its resources or the intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Define:
Q: Two-firewall screened subnet

A

A setup with two firewalls where the external firewall manages public access and the internal firewall protects private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

List:
Q: Common practices for firewall packet filters in screened subnets

A

Close all ports by default.

Open only necessary ports.

Use a VPN server for internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Define:
Q: VPN server in a screened subnet

A

Allows internet users to authenticate and access private resources via the VPN, ensuring secure communication.

54
Q

Define:
Q: Packet filter

A

Firewall rule allowing or blocking traffic to and from specific resources based on packet attributes.

55
Q

Define:
Q: Firewall

A

A device or software that monitors, filters, and controls network traffic to protect internal networks from external threats.

56
Q

List:
Q: Types of firewalls

A

Host-based.
Network-based.
Web application firewall (WAF).
Next-generation firewall (NGFW).
Unified threat management (UTM).
Stateless.
Stateful.
Layer 4.
Layer 7.

57
Q

Define:
Q: Host-based firewall

A

Software firewall installed on a single host to protect it from unauthorized traffic, especially in public networks.

58
Q

Define:
Q: Network-based firewall

A

Hardware firewall that inspects traffic flowing between networks, typically placed at the network perimeter.

59
Q

Define:
Q: Web application firewall (WAF)

A

A firewall protecting web servers and databases from code injection and denial-of-service attacks using application-aware rules.

60
Q

List:
Q: Features of a next-generation firewall (NGFW)

A

Layer 7 application-aware filtering.

Intrusion prevention system (IPS).

Layer 4 inspection

Cloud networking integration.

Directory integration RBAC policies

61
Q

Define:
Q: Unified threat management (UTM)

A

A device combining multiple security controls, such as firewall, antivirus, VPN, and content filtering, into one appliance.

62
Q

Define:
Q: Stateless firewall

A

A basic packet-filtering firewall that does not track session information, analyzing each packet independently.

63
Q

Define:
Q: Stateful firewall

A

Tracks session information, storing it in a state table, and applies filtering rules to new or unknown connections.

64
Q

Define:
Q: Layer 4 firewall

A

Inspects transport layer traffic, tracking TCP/UDP sessions and blocking anomalies like session hijacking attempts.

65
Q

Define:
Q: Layer 7 firewall

A

Inspects application layer traffic, ensuring protocol-port matches and detecting patterns in headers and payloads.

66
Q

List:
Q: Downsides of UTM firewalls

A

Single point of failure.

Latency under heavy loads.

Lower performance.

67
Q

Define:
Q: VPN (Virtual Private Network)

A

A remote-access connection using encryption to securely send data over untrusted networks.

68
Q

Acronym:
Q: VPN

A

(Virtual Private Network)

69
Q

List:
Q: VPN tunnel types

A

Full tunnel (routes all traffic through the VPN).
Split tunnel (routes specific traffic through the VPN).

70
Q

List:
VPN Types

A

Host-to-host VPN
Site-to-site VPN
Remote-access VPN
Always-on VPN

71
Q

Define:
Q: Host-to-host VPN

A

A VPN connection established between two individual hosts with encryption software configured on both.

72
Q

Define:
Q: Site-to-site VPN

A

A VPN connection between routers at the edge of two sites, enabling encrypted communication without host awareness.

73
Q

Define:
Q: Remote-access VPN

A

A VPN using a server (VPN concentrator) to connect multiple individual hosts to a private network.

74
Q

Define:
Q: Always-on VPN

A

A VPN configuration where all traffic is tunneled continuously, whether the user is remote or on the LAN.

75
Q

List:
Q: Types of VPN protocols

A

Carrier Protocol (e.g., IP).
Tunneling Protocol (e.g., PPTP, L2TP).
Passenger Protocol (transmitted data).

76
Q

Define:
Q: VPN concentrator

A

An advanced router/server that creates and maintains secure VPN connections for multiple users.

77
Q

Acronym:
Q: IPsec

A

Internet Protocol Security

78
Q

Define:
Q: Internet Protocol Security (IPsec)

A

A VPN protocol operating at OSI layer 3, providing encryption and authentication for secure communication.

79
Q

List:
Q: Core protocols in IPsec

A

Authentication Header (AH) – ensures integrity but does not encrypt payloads.

Encapsulating Security Payload (ESP) – encrypts payloads and provides integrity.

80
Q

List:
Q: IPsec modes

A

Transport mode in IPsec
Tunnel mode in IPsec

81
Q

Define:
Q: Transport mode in IPsec

A

Encrypts only the payload of packets, leaving headers unencrypted for private network communication.

82
Q

Define:
Q: Tunnel mode in IPsec

A

Encrypts the entire IP packet (header and payload) for secure site-to-site VPN communication.

83
Q

Define:
Q: SASE (Secure Access Service Edge)

A

A cloud-based security architecture combining WAN technologies with advanced security features under a zero-trust model.

84
Q

List:
Q: Security features of SASE

A

Identity and Access Management (IAM).
Zero-trust security model.
Intrusion prevention.
Malware protection.
Content filtering.

85
Q

Define:
Q: SD-WAN

A

Software-Defined Wide Area Network that connects branch offices and datacenters with enhanced encryption and traffic management.

86
Q

List:
Q: Advantages of SD-WAN

A

Encrypts data across the network.
Segments traffic based on priority.
Centralizes security policy management.
Intelligently routes traffic based on applications.

87
Q

Define:
Q: Network Access Control (NAC)

A

A system that authenticates users and devices, enforces security policies, and ensures compliance before granting network access.

88
Q

List:
Q: What does NAC evaluate before granting access?

A

Operating system version.
Patch level.
Antivirus status.
Presence of security software.

89
Q

List:
Q: Attributes used by NAC to restrict access

A

User profile.
Device type.
Location.
Other attributes.

90
Q

Define:
Q: Dynamic VLAN assignment

A

A NAC feature assigning VLANs based on user identity, device type, location, or health checks.

91
Q

Define:
Q: Quarantine VLAN

A

A VLAN isolating non-compliant devices to limit potential network damage.

92
Q

Define:
Q: Zero-trust security in NAC

A

A model requiring devices to pass authentication and authorization before network access is granted.

93
Q

List:
Q: Two stages of the NAC process

A

Authentication.
Authorization.

94
Q

Define:
Q: Agent-based NAC

A

A NAC method using software agents on devices to assess compliance and provide detailed status information.

95
Q

Define:
Q: Agentless NAC

A

A NAC method evaluating devices through network scans or DHCP fingerprinting without requiring installed agents.

96
Q

List:
Q: Examples of NAC scanning techniques

A

Vulnerability scanners (e.g., Nessus, OpenVAS).

Windows Management Instrumentation (WMI) queries.

Log parsers.

97
Q

Define:
Q: Automatic remediation in NAC

A

A feature allowing NAC to resolve compliance issues, such as updating software or adjusting settings.

98
Q

Define:
Q: BYOD (Bring Your Own Device) in NAC

A

A policy where NAC secures personal devices connecting to the internal network.

99
Q

Define:
Q: Privilege escalation

A

Exploiting a bug or flaw to access system resources or privileges not intended for the user.

100
Q

Define:
Q: Backdoor

A

An unprotected access method, often added during development or by attackers, to bypass security controls.

101
Q

Define:
Q: Zero-day vulnerability

A

A previously unknown flaw exploited before developers can patch it, posing significant and unpredictable risks.

102
Q

Define:
Q: Responsible disclosure

A

The process of privately informing vendors about vulnerabilities so they can patch them before public disclosure.

103
Q

Define:
Q: Zero-day exploit

A

An attack or malware taking advantage of a zero-day vulnerability.

104
Q

Define:
Q: Vulnerability scanning

A

A process to identify misconfigurations and missing patches in software and systems, supporting application and network security.

105
Q

List:
Q: Popular vulnerability scanning tools

A

OpenVAS.
Nessus.

106
Q

Define:
Q: Application vulnerability scanning

A

A specialized method to detect software-specific weaknesses using static and dynamic analysis.

107
Q

Define:
Q: Package monitoring

A

Tracking and assessing third-party software packages, libraries, and dependencies for known vulnerabilities.

108
Q

List:
Q: Tools for package monitoring

A

Software Composition Analysis (SCA) tools.
National Vulnerability Database (NVD).
Vendor-specific advisories.

109
Q

Define:
Q: Software Bill of Materials (SBOM)

A

A detailed inventory of software components, libraries, and dependencies used for managing supply chain risks.

110
Q

List:
Q: Steps for managing networking software

A

Write usage policies.

Prevent software installation.

Block firewall ports used by software.

Application control solutions.

111
Q

Define:
Q: Application control solution

A

A tool that inspects packet contents to identify and manage network applications using application signatures.

112
Q

List:
Q: Actions for applications not on the allow list

A

Flagged (allowed but logged).
Blocked (denied, session dropped).
Tarpitted (silently dropped, appearing unresponsive).

113
Q

Define:
Q: Tarpitting applications

A

A technique to keep connections alive while silently dropping application data to delay malicious traffic.

114
Q

Define:
Q: Challenges with firewalls for application control

A

Firewalls may not inspect packet contents

Circumvent ACLs by reconfiguring applications to use open ports.

115
Q

Define:
MAC flooding

A

Network attack that overloads a switch MAC table, causing it to broadcast like a hub

116
Q

Define:
ARP poisoning/spoofing

A

The attacker associates his MAC address to the victim’s IP, enabling traffic interception and modification

117
Q

Define:
MAC spoofing

A

Changing a source MAC address to bypass security mechanisms

118
Q

Define:
DTP - Dynamic Trunking Protocol

A

A protocol for automatic trunk port negotiation that is insecure and should be disabled on access ports

119
Q

List:
The steps in hardening a switch

A
  1. Change default credentials.
  2. Disable unnecessary services.
  3. Use secure management protocols (e.g., SSH, HTTPS).
  4. Implement ACLs.
  5. Enable logging and monitoring.
  6. Configure port security.
  7. Enforce strong password policies.
  8. Physically secure equipment.
120
Q

Acronym:
TCP and UDP

A

Transmission Control Protocol

User Datagram Protocol

121
Q

Define:
TCP - Transmission Control Protocol

A

A connection-oriented protocol ensuring reliability, ordering, and error-checking for data transmission.

122
Q

Define:
UDP - User Datagram Protocol

A

A connectionless protocol suited for real-time applications like video streaming and gaming, prioritizing speed over reliability

123
Q

Define:
Tarpitted application traffic

A

Silently dropping application data while keeping the connection alive to delay attackers

124
Q

Port:
HTTP and HTTPS

A

80 and 443

125
Q

Protocol for port:
80 and 443

A

HTTP and HTTPS

126
Q

List:
Physical security for routers

A

Locked rooms
CCTV
Access logs

127
Q

Define:
Typical configuration for an anti-spoofing rule

A

Block inbound packets with internal IP address

128
Q

Define:
Segmentation

A

Dividing a network into segments to isolate systems, limit attack spread, and enhance data protection

129
Q

List:
Benefits of network segmentation

A
  1. Limits attack spread.
  2. Enhances data privacy.
  3. Allows granular access control.
  4. Increases detection and response time for threats.
130
Q

Define:
Device isolation

A

Segregating devices restrict interaction and prevent lateral threat movement within a network.