Network Security Operations Flashcards

1
Q

packet filtering firewall

A

inspects source and destination IP, limit placed on packets that can enter the network - operates at layer 3 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

stateful inspection firewall

A

every packet is analyzed, categorized, and a security decision is made - operates at layers 3, 4, 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

stateless firewalls

A

does not keep track of traffic flows, needs 2 rules to reach destination point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

application level firewall

A

blocks program-level traffic and analyzes packet content - operates at level 7 (and below)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

application layer attack - SQL injection attack solution

A

leverage a reverse proxy system and scan incoming packets for malicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

presentation layer attack - man in the middle attack solution

A

mitigate using an application-layer proxy or IPS, and train users about fake security certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

session layer attack - RPC solution

A

mitigate with regular OS and application patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

transport layer attack - port scanner solution

A

mitigate by using a packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

network layer attack - ping sweep attack solution

A

mitigate by using packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data link layer - VLAN hopping solution

A

configure the VLAN tagging per the switch vendor’s recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physical layer - wiretapping solution

A

look for physical vulnerabilities, check locks on doors, racks, wiring closets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WEP

A

use pre-shared key and RC4 algorithms, weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA

A

uses RC4 algorithms and TKIP which rekeys every 10,000 packets (better than WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA2

A

uses AES and CCMP (most used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WPA3

A

strongest but newer, not so much used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ad-hoc wireless infrastructure mode

A

all wireless communication is performed in a peer-to-peer fashion and does not require a WAP

17
Q

infrastructure wireless network infrastructure mode

A

a WAP or wireless router is used to connect wireless devices to the network

18
Q

symmetric encryption

A

uses the same key

19
Q

asymmetric encryption

A

one public and one private key

20
Q

SSL - secure socket layer

A

uses an asymmetric key pair, end-to-end encryption

21
Q

TLS - transport layer security

A

successor to SSL

22
Q

IDS (intrusion detection system)

A

designed to monitor both inbound and outbound data traffic and report on any suspicious activity

23
Q

IPS (intrusion preventions system)

A

has capability to stop or prevent malicious attacks that is detects in real time by integrating with the firewall

24
Q

packet shaper

A

device that sits between a campus network and an outside network and is configured with a set of rules used to prioritize data traffic for shaping bandwidth

25
Q

PIPEDA requires orgs to do this with people’s information

A

explain how personal identifiable info is collected, used, and disclosed

26
Q

wireless encryption method that includes each device using a unique encryption key

27
Q

primary goal of separation of duties in IT security

A

prevent fraud and unauthorized data access by requiring more than one person to complete certain tasks

28
Q

redesigning protocols to fit more naturally into daily workflows for people serves what security principle?

A

psychological acceptability

29
Q

in discretionary access control systems, who typically has authority to set or change permissions?

A

owner of the resource

30
Q

wireless encryptions from weakest to strongest

A

WEP -> WPA -> WPA2 -> WPA3

31
Q

sophisticated firewall that examines individual packets and their collective grouping represents what type of access control?

A

context based