Network Security Flashcards

1
Q

The physical layout of the network hardware

A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The arrangement of data and how it flows across the network

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Main network zones include?

A

Private intranet
Limited-access extranet
Public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local network protected by a single firewall
Often referred to as a SOHO DMZ
Uses a single firewall to protect a local network

A

Screened Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Segmentation

A

To monitor and control how data moves between different parts of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uses proxies to handle traffic and keep DMZ hosts (bastion hosts) minimal and secure.
They keep external-facing servers separate from the internal network to reduce exposure to attacks

A

Demilitarized Zones (DMZs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This model continuously verifying all users and devices, not just trusting them based on their location

A

Zero Trust model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitors network to detect and alert on potential security threats. It uses sensors to capture and analyze traffic and can alert you if something is detected

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Actively responds to and mitigates threats in real-time

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Divides the network into smaller, isolated segments ( single host zones) to enhance/ boost security

A

Microsegmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Combines multiple data streams into a single stream for analysis

A

Aggregation TAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VLAN

A

Virtual local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of network design vulnerabilities

A

Single point of failure
Complex dependencies
Availability versus confidentiality integrity
Overdependence on parameter security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Solution for a single point of failure

A

Implement redundancy systems and fail logical things are over mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solutions for complex dependencies

A

Simplified dependencies and enhance tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To address vulnerability, such as availability versus confidentiality and integrity, you would?

A

Balance, all aspect of security, keeping things, private , safe and unchanging
Change control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you deal with overdependence on parameter defenses and security?

A

Regularly assess parameter defenses and avoid over reliance on parameter security by integrating, internal protections and follow best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Traffic filtering uses _____ between zones to prevent unauthorized access?

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_________ traffic entering your network/receiving

A

southbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

________ traffic leaving your work. Send it.

A

Northbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Traffic happening between devices in the network

A

East west traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

These zones are designed to isolate Internet facing hose from the internal network

A

Demilitarize Zones (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These hosts in the DMZ are not fully trusted and run minimum services

A

Bastion hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network zone segment the network into areas with similar?

A

Security needs clarification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

______ captures network traffic data

A

Network sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Detection engine

A

Analyze traffic in real time to identify indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Components of intrusion detection systems

A

Network sensors
Detection engine
Passive logging / alerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Does not rely solely on perimeter security it implements continuous in context based authentication. Verifies all users and devices

A

Zero trust model to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

______ are used to capture an analyze traffic and can alert you as something suspicious as de

A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mirrors traffic from a switch port for analysis

A

Switch port analyzer (SPAN) great
Mirror port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Provide a copy of network traffic without affecting the network. If the machine works, but the tab structure stops working it will continue.

A

Passive test access point (TAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Allows for interaction with network traffic, potentially in introducing delays like a firewall

A

Active TAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Identifies threats by matching patterns and network traffic against a database of known attack signatures

A

Signature based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Identifies anomalous by establishing a baseline of normal behavior and detecting deviation from this baseline

A

Behavior-based detection (NBAD)
Heuristic based anti attack structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Learning from experience

A

Heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Analyzes user and entity behavior to detect anomalies

A

User and entity behavior analytics (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Monitors network traffic to identify irregularities

A

Network traffic analysis (NTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Includes application-aware filtering, user-base filtering, integrated IPS, and cloud inspection

A

Next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Combines various security controls to a single platform, including firewall, Auntie, Mauer, network, confusion, prevention, spam filter, content, filtering, data, loss prevention, VPN, cloud access gateway

A

Unified threat management (UTM) things here and there DLP prevention tools that will catch when you’re sending something you shouldn’t be sending out of the office hours. We’re gonna block it.

40
Q

Focus on outgoing user traffic content, block list, and allow us

A

Content filter

41
Q

DLP

A

Data loss prevention

42
Q

Inspects and protects web applications by analyzing HTTP packets

A

Web application firewalls (WAFs)

43
Q

DMZs

A

Demilitarized Zones

44
Q

SOHO DMZ

A

Screened Host

45
Q

IDS

A

Intrusion detection system

46
Q

SPAN

A

Switched port analyzer

47
Q

TAP

A

Test access point

48
Q

IPS

A

Intrusion prevention system

49
Q

NBAD

A

Network behavior and anomaly detection

50
Q

WAP

A

Wireless access point

51
Q

SSID

A

Service set identifier

52
Q

BSSID

A

Basic service set identifier

53
Q

NTA

A

Network traffic analysis

54
Q

UEBA

A

User and entity behavior analytics

55
Q

NGFW

A

Next generation firewall

56
Q

UTM

A

Unified threat management

57
Q

WAFs

A

Web Application firewall

58
Q

SIEM

A

Security information and Event Management

59
Q

Visualize signal strength from high (red) to low (green/blue)

60
Q

The action of assessing signal strength, and channel usage

A

Site surveys

61
Q

SSID

A

Service set identifier

62
Q

BSSID

A

Basic service set identifier

63
Q

ACI

A

Adjacent channel interference

64
Q

WPA

A

Wi-Fi protected access

65
Q

AES

A

Advance encryption standard

66
Q

TKIP

A

Temporal key integrity protocol

67
Q

SAE

A

Simultaneous authentication of equals

68
Q

What WiFi protected access uses AES

69
Q

What WiFi protected access uses TKIP

70
Q

What WiFi protected access uses SAE

71
Q

WPS

A

Wi-Fi protected set up

72
Q

Provides enhanced security

A

Simultaneous authentication of equals (SAE)

73
Q

PSK

A

Pre-shared key authentication

74
Q

QoS

A

Quality of service

75
Q

VPN

A

Virtual private network

76
Q

This requires users to authenticate through a webpage before accessing the network

A

Captive portals

77
Q

Control of traffic, flow and insurance compliance with policies

A

Traffic policing

78
Q

TLS

A

Transport layer security

79
Q

PKI

A

Public key infrastructure

80
Q

TCP

A

Transmission control protocol

81
Q

UDP

A

User datagram protocol

82
Q

IPSec

A

Internet Protocol Security

83
Q

AH

A

Authentication Header

84
Q

ESP

A

Encapsulation Security Paylod

85
Q

RDP

A

Remote desktop protocol

86
Q

SSH

A

Secure shell

87
Q

Collect logs from various sources, using agents, collectors, standard protocols, like Syslog, or sensory to gather data

88
Q

_______ Identifies the network

A

Service set identifier (SSID)

89
Q

______WAPs handle most network functions independently

90
Q

____ WAPs rely on a central controller for management

91
Q

Enhanced security protocol

A

Simultaneous Authentication of Equals (SAE)

92
Q

Secure communication between gateways across unrested network

A

Tunnel mode

93
Q

Secure connections between individual hosts on a private network

A

Transport mode

94
Q

All traffic is encrypted and protective by the network. Routes all Internet traffic through the VPN.

A

Full tunnel

95
Q

Provide secure authentication with tickets