Network Design Flashcards

1
Q

MAC Flooding

A

an attacker floods network switches with fake MAC addresses to compromise their security

Switches can fail-open when flooded and begin to act like a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC Spoofing

A

A MAC spoofing attack is where the intruder sniffs the network for valid MAC addresses and attempts to act as one of the valid MAC addresses

Limit static MAC addresses accepted
Limit duration of time for ARP entry on hosts
Conduct ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

De-Militarized Zone - DMZ

A

A segment isolated from the rest of a private network by one or more firewalls

physical or logical subnet that separates a local area network (LAN) from other untrusted networks

Everything behind the DMZ is invisible to the outside network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Extranet

A

created for your partner organizations to access over a wide area network

Intranets are used when only one company is involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bastion Hosts

A

Hosts or servers in the DMZ which are not configured with any services that run on the local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jumpbox

A

server that provides access to other hosts within the DMZ

An administrator connects to the jumpbox and the jumpbox connects to hosts in the DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Access Control - NAC

A

devices are scanned to determine its current state prior to being allowed access onto a given network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAC: Persistent Agents

A

A piece of software that is installed in the OS device: checks if end points who wanna have access are trusted, have latest anti-virus software …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAC: Non-Persistent Agents

A

A piece of software that is not installed in OS. You install it, scans the device, and remove after the scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why using a VLAN

A

allows you to take one physical switch, and break it up into smaller mini-switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VLANs: Switch Spoofing

A

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VLANs: Double Tagging (attack)

A

The attacker creates a trunk port between their PC and the switch by using the DTP negotiation methods. Then the attacker creates a double tag with the intended VLAN as the inside tag, and the native VLAN as the outside tag. When the switch receives the frame, it sees the outer tag as native VLAN and therefore discards the outer tag. Hence it would look as if the frame is intended to get the VLAN on which the victim is placed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benefits of Subnetting

A

Efficient use of IP addresses
Reduced broadcast traffic
Reduced collisions
Compartmentalized

Subnet’s policies and monitoring can aid in the security of your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Address Translation - NAT

PAT - Port Address Translation

A

Network Address Translation:
allows multiple devices to access the Internet through a single public address. To achieve this, the translation of a private IP address to a public IP address is required.

NAT is a process in which one or more local IP address is translated into one or more Global IP address and vice versa to provide Internet access to the local hosts.

Port Address Translation:
permits multiple devices on a LAN to be mapped to a single public IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Telephony

A

Term used to describe devices that provide voice communication to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Modem

A

A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line

17
Q

War Dialing

A

Basically brute-force dialing numbers until you get a modem’s number

Protect dial-up resources by using the callback feature

18
Q

PBX

A

Public Branch Exchange:

Internal phone system used in large organizations

19
Q

Zigbee

A

wireless technology developed to enable low-cost, low-power wireless IoT networks

Alternative to WiFi & Bluetooth
Longer distances than Bluetooth
Less power than WiFi