Network Security Operations Flashcards
Blank start with understanding how a firewall is used to secure a network
Foundational Network security
What is a barrier that intercepts and inspects traffic moving from one area of the network to another?
Firewall
What may be physical appliances or may be virtual appliances operating as a VMS.
firewall
What is the term for a firewall that operates as apps running on workstations and servers
host-based firewalls
All firewalls have what in common that will determine whether the firewall will permit or deny traffic to pass on to its intended destination
Set of rules
Blank is a firewall that operates on layers 3 & 4.
Packet Filtering
Most networks equate what to layer 3 and what to layer 4
IP address
TCP or UDP port number
Blank inspect incoming (ingress) and outgoing (egress) traffic and compare the attributes to a database of packet filter rules that determine if the movement is permitted
Firewalls
Name the five attributes in a packet filter
Protocol (typically IP)
Source of IP address
Destination IP address
Source TCP or UDP port number
Destination TCP or UDP port number
Packet filters are only concerned with what of the packets and perform no level of inspections on the contents of the package
Address label (header)
What could pass through packet filtering undetected as long as the source and destination values were approved by the firewall rules
Dangerous payloads
What is a device that operates as a middleman between two or more systems to help conceal the true nature of the client and server
Circuit Level Gateways
The circuit level gateway may change what two things to allow two networks to communicate that otherwise could not
IP address and TCP/UDP port number
What does NAT stand for
Network address translation
What does PAT stand for
Port address translation
What refers to the connection state of a conversation between two computers
State
What term operates on levels 3,4,5 that allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender
Stateful Inspection
The goal of stateful inspections is to reduce what?
Firewall rules
To combat malicious traffic passing into the network unchecked (packet filtering) , what was created as a middle-man that reads and parses the traffic payload before forwarding it (if safe)
Proxy servers
Inspection of payload is commonly called what?
Application-aware firewalls or Layer-7 firewalls
What two things are advanced security solutions that can identify malicious traffic based on a database of known behaviors and payload signatures?
IDS and IPS
What monitors networks to detect threats?
IDS
What intercepts and blocks threats?
IPS
What is the term for when IDS and IPS attach to a network in listen-only mode, alerting a network admin if they detect any suspicious behavior
Tap mode
What mode refers to the configuration required for an IPS to intercept and block suspicious traffic?
In-line mode
What is the term for when an IPS device blocks files known to carry viruses and malware, like .exe files
Reputation-based protection
What device monitors the network to detect threats, listens passively and alerts network admins of suspicious behavior?
IDS
What device intercepts and blocks and creates choke points?
IPS
Which layer includes protocols such as 802.3 and 802.11?
Layer 2 (data link)
What is a layer 1 threat because it involves tampering with the physical cables of a victim’s network?
Wiretapping
Wiretapping, theft of devices, and unlocked equipment racks are all threats at what layer?
Layer 1 (physical)
What as a Layer 1 attack could interfere with a victim’s wireless network card and prevent him from communicating with a WAP?
Radio Jammer
What layer attack would a wireless deauthentication attack be?
Layer 2 (Data Link)
What type of attack involves sending a special frame to a WAP that disconnects it from the wireless network?
Wireless Deauthentication
What can be the goal of deauthentication attacks?
Getting the wireless network password
What layer is an ARP poisoning attack?
Layer 2
What attack sends special frames to the network that quickly poison the switch’s internal traffic handling database?
ARP poisoning
What does FIB stand for?
Forwarding Information Base
The switch is a network device at what level?
Layer 2 (Data Link)
An attacker can merge ARP poisoning with what to reconstruct and analyze the received frames to gather info for future attacks?
Packet Sniffer
Ethernet switches separate traffic into multiple logical networks called what?
Virtual local area network (VLANS)
A switch can operate in one of what two modes?
Access mode (untagged mode)
Trunk Mode (tagging mode)
What ports are used by servers and workstations assigned to a single VLAN?
Access Mode
What ports are used to interconnect multiple switches or routers and carry traffic to multiple VLANS
Trunk mode
What is a layer 2 attack that occurs when an attacker gets access to a computer connected trunk port that allows them to join a network that would not normally be available to them?
VLAN hopping attack
What attack can be mitigated by following a switch vendor’s recommendation for VLAN configuration as well as designating computer switch ports as access mode?
VLAN hopping attack
What layer attack is a ping attack?
Layer 3: Network
What can mitigate a ping attack?
Packet filtering firewall
Spoofing attacks can occur on what two levels?
Layer 2 (data Link) and Layer 3(network)
What does MAC stand for?
Media Access Control
Which protocol is a connection-oriented protocol?
TCP
Which protocol is a connection-less protocol?
UDP
A connection-oriented protocol provides what when data is sent between two computers?
Delivery confirmation
What tool can an attacker run that allows him to scan the victim’s computer for open ports that they could later attack?
Port Scanner
What helps against a port scanning attack?
Packet-filtering firewall
What layer does a port scanning attack work on?
Layer 4: Transport
What is a commonly known port number?
TCP port 8080
What is the practice of redirecting a commonly known port number in hopes of hiding that the computer is running a web browser?
Port redirection
What is a protocol at layer 5: Session?
Remote Procedure Call (RPC)
What attacks are at layer 5?
RPC attacks
How do you mitigate RPC attacks?
Regular operating system updates and patches
What conceals data and is commonly performed at presentation level?
Encryption
Encryption at the presentation level uses what, which is the replacement for what?
Transport Layer Security
SSL protocol
What attack occurs at Layer 6?
Man-in-the-middle attack