Network-Based Security Flashcards

1
Q

What is an IDS

A

A Tool that is used to monitor and analyse network traffic and raise an alarm for anything abnormal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an IPS

A

Similar to an IPS but also acts upon anomalies as opposed to monitoring them like IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a RADIUS Server

A

A system that can remotely control access to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can a RADIUS Server Do?

A

Authenticating and authorising users, then managing the policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a AAA Server Stand for (And Focuses on)?

A

Authentication
Authorisation
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Perimeter Network?

A

Separates an organisation private network (intranet) from a public network such as the Internet. It is common to install such devices as wireless access points, web servers and email servers in a perimeter network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can a Perimeter Network also be referred to as?

A

A DMZ or a Public/Outward Facing Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DMZ used for?

A

DMZ’s are commonly employed for the general public as guest servers, where users can access the internet using a business’s network but have no access to their infrastructure. Vice versa, attacks coming from the internet will target the DMZ as opposed to the business’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does an IoT gateway do?

A

Allows devices to communicate with each other in a network or between networks, which also allows internet capability. Especially useful for legacy devices as it provides additional security for data that transfers through the gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the RIP Routing Protocol

A

Routing Information Protocol utilises a hop count based on distance. RIP is limited by 15 hops within a network and is therefore best suited for smaller networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the OSPF Routing Protocol?

A

Open Shortest Path First uses link state routing where nodes send information to each other to create a map. It then uses the Dijkstra’s Algorithm to calculate the shortest route to take using the map generated at the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Dijkstra’s Algorithm do?

A

calculate the shortest route to take using the map generated at the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Policy Based Routing?

A

Used to define a path that a packet must take through a network based on its payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is common practice for networks that dont support QoS?

A

Networks that do not support a control mechanism like QoS (Quality of Service), usually focus on traffic prioritisation where it provides high quality voice communications. This is known as best-effort networks where there are adjustments the different types of traffic such as download and upload speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a downside to Traffic Prioritisation?

A

There is no guaranteed delivery of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Human factors of QoS?

A

Human factors of QoS could include the stability and availability of services

17
Q

What is Network Segregation?

A

This involves splitting a network into smaller networks where users are assigned to their own specific network based on their roles. In large businesses where there are many employees within each department, may have their own segregated networks so users only have access to what they require. For instance, operations staff would not be able to access the financial documents from the finance department etc.
8
VLANs can be used to separate computers and users into more appropriate networks.