SEC+ Chapter 5 Flashcards

1
Q

What is Network Architecture in enterprise networks?

A

Selection and placement of media, devices, protocols/services, and data assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main components of Network Architecture?

A

Network Infrastructure, Network Applications, and Data Assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Network Infrastructure.

A

Media, appliances, addressing/forwarding protocols that support basic connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Network Applications?

A

Services running on the infrastructure to support business activities, such as processing invoices or sending emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Data Assets in network architecture?

A

Information created, stored, and transferred as a result of business activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the Secure Design Principles in network architecture?

A

Confidentiality, Integrity, Availability (CIA) to ensure secure business workflows by protecting these attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the Email Provisioning Workflow example.

A

Client device accesses network via physical channel. User authenticates and is authorized to use the email application. Unauthorized users/devices are denied access. Email Mailbox Server stores data assets, accessible only by authorized clients, and must be highly available and fault-tolerant. Mail Transfer Server connects with untrusted Internet hosts, controls communication between untrusted and trusted networks, and enforces policy-based controls on data/software transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the OSI Model used for in network infrastructure?

A

A framework to analyze network infrastructure and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the main Network Components?

A

Nodes (hosts and intermediary devices) and Links (physical media).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differentiate between LAN and WAN.

A

LAN (Local Area Network) covers a single site with limited geographic area, while WAN (Wide Area Network) spans metropolitan, country-wide, or global areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Layer 2 and Layer 3 addressing and forwarding protocols?

A

Layer 2: MAC addresses, switches, broadcast domains. Layer 3: IP addresses, routers, separate subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do switches function at Layer 2?

A

Forward frames based on MAC addresses and define broadcast domains within VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What role do Wireless Access Points play in network infrastructure?

A

Bridge cabled networks with wireless hosts using MAC addressing similar to wired switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary function of routers in Layer 3?

A

Forward packets based on IP addresses and act as default gateways for subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compare TCP and UDP at Layer 4.

A

TCP: Provides reliable, connection-oriented communication. UDP: Offers unreliable, connectionless transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Application Protocols at Layer 7 used for?

A

Support client/server functionality, such as HTTP and SMTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the role of DNS Servers at Layer 7?

A

Resolve Fully Qualified Domain Names (FQDNs) to IP addresses; they are infrastructure services, not user-level services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Star Topology in network switching?

A

A topology with a central switch and radiating connections to hosts, simplifying management and expansion but creating a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three layers in a Hierarchical Network Design?

A

Access Layer, Distribution Layer, and Core Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the benefits of a Hierarchical Network Design?

A

Improved performance, scalability, and security through network segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of Virtual LANs (VLANs)?

A

Logical segmentation of the network into separate broadcast domains for improved security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do VLANs enhance network security?

A

By isolating different types of devices and controlling traffic between VLANs through routing and firewall policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What defines Security Zones in enterprise networks?

A

Segments mapped to subnets with specific security levels, including perimeter and internal zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Perimeter in Security Zones?

A

The boundary between trusted (internal) and untrusted (external) zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Name the Internal Zones in Security Zones.

A

Database/File Systems, Client Devices, Public-Facing Servers, and Infrastructure Servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Attack Surface in network architecture?

A

Points where threat actors can access the network, including Layer 1/2 (physical connections, MAC addresses), Layer 3 (IP addressing, routing), and Layer 4/7 (ports, application protocols).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the two types of Attack Surfaces?

A

External/Public Attack Surface and Internal/Private Attack Surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Defense in Depth in network security?

A

Implementing multiple layers of security controls to protect against different threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are common weaknesses in network attack surfaces?

A

Single Points of Failure, Complex Dependencies, Prioritizing Availability Over Security, Lack of Documentation, Overdependence on Perimeter Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Port Security in network security?

A

Prevents unauthorized devices from connecting to the network through methods like physical security, MAC filtering, and IEEE 802.1X.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is IEEE 802.1X used for in port security?

A

Port-based Network Access Control requiring device authentication using EAP and RADIUS protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are Air-Gapped Networks?

A

Networks completely isolated from other networks, including the Internet, used in highly secure environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are Secure Administrative Workstations (SAW)?

A

Dedicated systems with minimal attack surfaces for administrative tasks to reduce the risk of credential theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What factors should be considered in Network Architecture Design?

A

Costs, Compute and Responsiveness, Scalability and Ease of Deployment, Availability, Resilience and Ease of Recovery, Power, Patch Availability, Risk Transference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Compare On-Premises and Cloud Networking.

A

On-Premises: Greater control and customization but high capital costs, low scalability, and complex recovery procedures. Cloud Networking: Scalability, flexibility, often better resilience but with ongoing costs and dependency on service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Zone-Based Network Security Architecture?

A

Ensures traffic between and within zones complies with access control policies, enforcing segmentation and monitoring traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the principle of Defense in Depth in device placement?

A

Implementing multiple layers of security controls across the OSI model to enhance protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the three types of security controls based on their function?

A

Preventive Controls, Detective Controls, Corrective Controls.

39
Q

Where are Preventive Controls typically placed?

A

At network segment or zone borders, such as firewalls and load balancers.

40
Q

What are Detective Controls and where are they placed?

A

Controls that monitor internal traffic and alert on malicious activity, typically placed within the perimeter (e.g., Intrusion Detection Systems - IDS).

41
Q

What are examples of Preventive, Detective, and Corrective Controls on individual hosts?

A

Host firewalls, antivirus software, and data loss prevention systems.

42
Q

Differentiate between Active and Passive Controls.

A

Passive Controls: Do not require client or agent configuration (e.g., traffic mirroring, TAPs). Active Controls: Require configuration and interaction with hosts (e.g., firewalls, intrusion prevention systems).

43
Q

What is Inline Deployment of security devices?

A

Devices are part of the cable path, processing all traffic, allowing active blocking or allowing of traffic.

44
Q

What is Tap/Monitor Deployment of security devices?

A

Devices passively copy traffic without being in the direct path, allowing monitoring without impacting traffic flow.

45
Q

Explain Fail-Open and Fail-Closed modes.

A

Fail-Open: Preserves network access during a failure but poses a security risk if exploited. Fail-Closed: Blocks access during a failure, maintaining security but potentially causing downtime.

46
Q

What is a Firewall in network security?

A

A preventive control that enforces access policies on traffic entering and exiting network zones.

47
Q

What are the types of Firewalls based on their operation layers?

A

Packet Filtering Firewalls, Layer 4 (Transport Layer) Firewalls, and Layer 7 (Application Layer) Firewalls.

48
Q

How do Packet Filtering Firewalls function?

A

Inspect IP headers and enforce ACLs based on IP addresses, protocols, and ports by accepting, dropping, or rejecting packets.

49
Q

What are the different appliance types for Firewalls?

A

Routed (Layer 3), Bridged (Layer 2), and Inline (Layer 1).

50
Q

What features do Layer 4 Firewalls offer?

A

Stateful inspection and session tracking based on transport layer information like TCP/UDP sessions.

51
Q

What features do Layer 7 Firewalls offer?

A

Deep packet inspection and application-aware filtering based on application protocols.

52
Q

What are Forward Proxy Servers used for?

A

Manage outbound traffic from clients to the Internet, providing traffic management, caching, and enhanced security.

53
Q

What are Reverse Proxy Servers used for?

A

Manage inbound traffic from the Internet to internal servers, offering load balancing, security, and SSL termination.

54
Q

What is the function of Intrusion Detection Systems (IDS)?

A

Monitor network or system traffic for malicious activity and generate alerts or log entries without blocking traffic.

55
Q

How do Intrusion Prevention Systems (IPS) differ from IDS?

A

IPS not only detect but also actively block or mitigate malicious traffic by actions like blocking source IPs or resetting connections.

56
Q

What are Next-Generation Firewalls (NGFW)?

A

Firewalls with Layer 7 application awareness, deep packet inspection, integrated IPS, and SSL/TLS inspection for enhanced security.

57
Q

What is Unified Threat Management (UTM)?

A

A consolidated security solution integrating multiple security functions like firewall, antivirus, IPS, spam filtering, VPN, and data loss prevention.

58
Q

What are the advantages and disadvantages of UTM?

A

Advantages: Simplified management and cost-effective for SMBs. Disadvantages: Potential single point of failure and performance bottlenecks.

59
Q

What is the purpose of Load Balancers in network architecture?

A

Distribute client requests across multiple server nodes to ensure scalability and availability.

60
Q

Differentiate between Layer 4 and Layer 7 Load Balancers.

A

Layer 4: Forward traffic based on IP addresses and TCP/UDP ports with lower latency. Layer 7: Forward traffic based on application-layer data like URLs and content types for advanced routing decisions.

61
Q

What are common Scheduling Algorithms used by Load Balancers?

A

Round Robin, Least Connections, and Response Time.

62
Q

What are Source IP Affinity and Session Persistence in Load Balancing?

A

Source IP Affinity: Sticks a client to a specific server based on IP address. Session Persistence: Maintains client-server sessions using cookies or other methods.

63
Q

What is a Web Application Firewall (WAF)?

A

A firewall that protects web applications by filtering and monitoring HTTP/HTTPS traffic against attacks like SQL injection and cross-site scripting (XSS).

64
Q

How are WAFs deployed?

A

As appliances positioned in front of web servers or as software plugins integrated into web server platforms.

65
Q

What are the benefits of implementing WAFs?

A

Enhanced security against application-specific attacks and detailed logging for threat analysis.

66
Q

What is Remote Access Architecture?

A

Users connect to the network through intermediate networks rather than direct cabled or wireless connections.

67
Q

What are the main Topologies in Remote Access Architecture?

A

Client-to-Site VPN (Telecommuter Model), Site-to-Site VPN, and Host-to-Host Tunnel.

68
Q

Describe Client-to-Site VPN.

A

Allows remote users to connect to the corporate network via a secure tunnel using VPN clients and gateways with protocols like TLS and IPsec.

69
Q

Describe Site-to-Site VPN.

A

Connects two or more private networks securely over the Internet automatically without needing client configuration at individual hosts, typically using IPsec.

70
Q

What is a Host-to-Host Tunnel?

A

Secures traffic between two specific computers without trusting the intermediary network.

71
Q

What is the primary purpose of Virtual Private Networks (VPNs)?

A

To securely transmit data over untrusted networks by creating encrypted tunnels.

72
Q

What are the main VPN Protocols?

A

Transport Layer Security (TLS) and Internet Protocol Security (IPsec).

73
Q

What is Transport Layer Security (TLS) used for in VPNs?

A

Commonly used for client-to-site VPNs, providing encrypted tunnels with mutual authentication using digital certificates.

74
Q

What is Internet Protocol Security (IPsec) used for in VPNs?

A

Commonly used for site-to-site VPNs and remote access, providing data integrity and confidentiality through AH and ESP protocols in Transport or Tunnel modes.

75
Q

What are the two modes of IPsec?

A

Transport Mode (secures communication between hosts by encrypting only the payload) and Tunnel Mode (secures communication between networks by encrypting the entire IP packet).

76
Q

What is Internet Key Exchange (IKE)?

A

A protocol used to establish security associations for IPsec, involving two phases: authentication and key exchange (Phase I) and negotiation of encryption and hashing algorithms (Phase II).

77
Q

What are the differences between IKEv1 and IKEv2?

A

IKEv1: Designed for site-to-site and host-to-host VPNs, requires additional protocols for remote access. IKEv2: Supports EAP authentication, simpler setup, NAT traversal, and MOBIKE for multihoming.

78
Q

What are the types of Remote Desktop Access?

A

Command Line Access (e.g., SSH) and Graphical Access (e.g., RDP, TeamViewer, VNC, HTML5 VPNs).

79
Q

What are the Security Considerations for Remote Desktop Access?

A

Encryption, strong authentication (including MFA), and access control measures like jump servers and restricted access.

80
Q

What is Secure Shell (SSH) used for?

A

Secure remote access to command-line interfaces.

81
Q

What are the components of SSH?

82
Q

What are the types of Desktop Access?

A

Command Line Access (e.g., SSH) and Graphical Access (e.g., RDP, TeamViewer, VNC, HTML5 VPNs).

83
Q

What are the components of SSH?

A

Host Key (public/private key pair) and Client Authentication Methods (Username/Password, Public Key Authentication, Kerberos).

84
Q

What are the Best Practices for SSH?

A

Regularly update and manage public keys, remove compromised keys, disable password authentication if using key-based methods.

85
Q

What are Jump Servers in SSH configurations?

A

Centralized servers that control access to other servers, reducing the attack surface by limiting direct access to sensitive systems.

86
Q

What is Out-of-Band Management (OOB)?

A

Management traffic is separated from regular network traffic using methods like serial consoles, dedicated management VLANs, or separate physical networks.

87
Q

What are the advantages and challenges of Air-Gapped Networks?

A

Advantages: High security and minimal attack surface. Challenges: Complex management, secure media handling, and manual updates.

88
Q

What are the purposes of Secure Administrative Workstations (SAW)?

A

Dedicated systems with minimal attack surfaces for administrative tasks to reduce the risk of credential theft and unauthorized access.

89
Q

What are the key factors to consider in Secure Communications Architecture?

A

Costs, Compute and Responsiveness, Scalability and Ease of Deployment, Availability, Resilience and Ease of Recovery, Power, Patch Availability, Risk Transference.

90
Q

Compare On-Premises and Cloud Networking in the context of Secure Communications.

A

On-Premises: Greater control and customization but high capital costs, limited scalability, and complex disaster recovery. Cloud Networking: Scalability, flexibility, often better resilience but with ongoing costs and dependency on service providers.

91
Q

What is a Host Key in SSH?

A

A public/private key pair that uniquely identifies the SSH server.

92
Q

What are the Client Authentication Methods in SSH?

A

Username/Password, Public Key Authentication, and Kerberos using GSSAPI.

93
Q

What are the Best Practices for Managing SSH Keys?

A

Regularly update and manage public keys, remove compromised keys, and disable password authentication if using key-based methods.

94
Q

What are Advanced Configurations in SSH?

A

Implementing Jump Servers and Out-of-Band Management to centralize and secure access to multiple hosts.