SecPlusP3 Flashcards
What are Industrial Control Systems (ICS)?
Monitor and control industrial processes
What are the two types of ICS?
Distributed Control Systems (DCS) and Programmable Logic Controllers (PLCs)
What are SCADA systems?
ICS designed for monitoring and controlling geographically dispersed industrial processes
What industries commonly use SCADA systems?
Electric power, water treatment, oil and gas
What is unauthorized access?
Manipulating system operations
What is a risk of malware attacks?
Disruptive attacks
Why is lack of updates a vulnerability?
Unpatched vulnerabilities
What are physical threats?
Damage to hardware or infrastructure
What are some ways to implement strong access controls?
Strong passwords, Two-factor authentication, Limited access to authorized personnel only
Why is it important to regularly update and patch systems?
To protect against known vulnerabilities
What are some measures to detect and prevent unauthorized access?
Use Firewall and Intrusion Detection Systems
Why is conducting regular security audits important?
To identify and address potential vulnerabilities through routine assessments
What is the purpose of employee training?
To train employees on security awareness and response to potential threats
What are embedded systems?
Specialized computing components designed for dedicated functions within larger devices
What is a Real-Time Operating System (RTOS)?
A system designed for real-time applications that process data without significant delays
What are some risks and vulnerabilities in embedded systems?
Hardware Failure
Software Bugs
Security Vulnerabilities
Outdated Systems
What are some key security strategies for embedded systems?
Network Segmentation
Wrappers (e.g., IPSec)
Firmware Code Control
Challenges in Patching
What are OTA updates?
Patches delivered and installed remotely
What are the objectives of the Security Infrastructure section?
3.2 - Apply security principles to secure enterprise architecture, 4.5 - Modify enterprise capabilities to enhance security
What does the Security Infrastructure encompass?
Hardware, software, networks, data, and policies
What are the different types of firewalls?
Web Application, Unified Threat Management, Next-generation
What are the functions of network appliances?
Load Balancing, Proxying
What is the purpose of Port Security?
Restricting and controlling network access
What is the basis of Port Security?
Media Access Control (MAC) addresses
What are the concepts related to Port Security?
802.1x and EAP
What technologies are used to secure network communications?
VPNs, IPSec, TLS
What is the objective of creating a secure backbone for communication?
To ensure secure communication
What is SD-WAN?
Software-Defined Wide Area Networks
What is SASE?
Secure Access Service Edge
What does SD-WAN optimize?
WAN connections with software-defined principles
What does SASE integrate?
Security and wide area networking
What are the infrastructure considerations for security?
Device placement, security zones, screen subnets, attack surfaces
What concerns and considerations are there for connectivity?
205
What are the different types of device attributes?
Active vs. passive, inline vs. taps or monitors
What are the two failure mode options for security devices?
Fail-open or fail-closed
How should infrastructure controls be selected?
Choosing controls aligned with network needs
What should be ensured for a robust security architecture?
Ensuring robust security architecture
What are ports?
Logical communication endpoints on a computer or server
What are the two classifications of ports?
Inbound and outbound
What are well-known ports and their range?
Assigned by IANA, range: 0-1023
What are registered ports and their range?
Vendor-specific, registered with IANA, range: 1024-49151
What is the range of dynamic and private ports?
49152-65535
What are temporary outbound connections typically used for?
Data exchange
Give an example of a protocol that uses port 443.
HTTPS
What should you memorize for each port?
Port number, default protocol, TCP or UDP support, basic description
Which protocol is typically associated with port 21?
FTP
Which protocols are typically associated with port 22?
SSH, SCP, SFTP
Which protocol is typically associated with port 23?
Telnet
Which protocol is typically associated with port 25?
SMTP
Which protocol is typically associated with port 53?
DNS
Which protocol is typically associated with port 69?
TFTP
What is the protocol used for port 80?
HTTP
What is the specific service associated with port 88?
Kerberos
Which protocol uses port 110?
POP3
Which protocol uses port 119?
NNTP
What is the abbreviation for Remote Procedure Call?
RPC
Which protocols use ports 137, 138, and 139?
NetBIOS
Which protocol uses port 143?
IMAP
What is a firewall?
Network security device or software that monitors and controls network traffic based on security rules
Why are firewalls important in cybersecurity?
Protects networks from unauthorized access and potential threats
What are some study tips for learning about firewalls?
Create flashcards with protocol, port, and connection details
Regularly test yourself to memorize ports and protocols
What is an advantage of Kernel Proxy Firewalls?
Minimal impact on network performance
Where are Kernel Proxy Firewalls typically placed?
Close to the system they protect
What is a characteristic of Next Generation Firewalls (NGFW)?
Application-aware
What is a capability of Next Generation Firewalls (NGFW)?
Conduct deep packet inspection
What method do Next Generation Firewalls (NGFW) use for intrusion detection?
Signature-based
What are the benefits of using a UTM Firewall?
Operate fast, full-stack traffic visibility, can integrate with other security products
What are the potential drawbacks of relying on a single vendor for firewall configurations?
Dependency and limitations on one product line
What functions does a UTM Firewall combine?
Firewall, intrusion prevention, antivirus, and more
What is a potential drawback of relying on a UTM Firewall?
UTMs are a single point of failure
What is the main focus of a Web Application Firewall (WAF)?
Inspecting HTTP traffic and preventing web application attacks
What are two common web application attacks that a WAF can prevent?
Cross-site scripting and SQL injections
What are the two possible placements for a WAF?
In-line (live attack prevention) and out of band (detection)
What layer does a Layer 4 Firewall operate at?
Transport layer
What is the purpose of a layer 7 firewall?
Inspect, filter, and control traffic based on content and data characteristics
What are access control lists (ACLs) used for?
Securing networks from unwanted traffic
Where are rule sets placed?
On firewalls, routers, and network infrastructure devices
What can be used to configure ACLs?
Web-based interface or text-based command line interface
What does the order of ACL rules specify?
Order of actions taken on traffic (top-down)
What happens when a matching rule is found in ACLs?
First matching rule is executed and no other ACLs are checked
Where should the most specific rules be placed in ACLs?
At the top
What should be done for devices that require a ‘deny all’ rule at the end?
Add a ‘deny all’ rule at the end
What actions taken by network devices should be logged?
Deny actions
What are ACL rules made up of?
Type of traffic, Source of traffic, Destination of traffic, Action to be taken against the traffic
What is a hardware-based firewall?
Dedicated network security device that filters and controls network traffic at the hardware level
What is a software-based firewall?
Firewall that runs as a software application on individual devices, such as workstations
How do firewalls ensure security?
By specifying permitted and denied actions through ACLs
What is the key difference between IDS and IPS?
IDS - Logs and alerts
IPS - Logs, alerts, and takes action
What are the three types of Intrusion Detection Systems (IDS)?
Network-based IDS (NIDS), Host-based IDS (HIDS), Wireless IDS (WIDS)
What does a Network-based IDS (NIDS) monitor?
Traffic coming in and out of a network
What does a Host-based IDS (HIDS) look at?
Suspicious network traffic going to or from a single endpoint
What does a Wireless IDS (WIDS) detect?
Attempts to cause a denial of service on a wireless network
What are the two types of detection algorithms used in IDS?
Signature-based and anomaly-based
What is the purpose of analyzing traffic based on defined signatures?
To recognize attacks based on previously identified attacks
What is pattern-matching used for in traffic analysis?
To identify specific patterns of steps
What are some examples of systems that use pattern-matching?
NIDS, WIDS
What is stateful-matching used for in traffic analysis?
To compare against a known system baseline
What is an Anomaly-based IDS?
Analyzes traffic and compares it to a normal baseline of traffic to determine whether a threat is occurring
What are the five types of Anomaly-based Detection Systems?
Statistical, Protocol, Traffic, Rule or Heuristic, Application-based
What is an Intrusion Prevention System (IPS)?
Logs, alerts, and takes action when it finds something suspicious or malicious
What does a Network Appliance refer to?
A dedicated hardware device with pre-installed software for specific networking services
What is the purpose of load balancers?
Distribute network/application traffic
Why are load balancers important?
Enhance server efficiency and prevent overload
What do load balancers ensure?
Redundancy and reliability
What do application delivery controllers offer?
Advanced functionality
Where are load balancers essential?
High-demand environments and high-traffic websites
What are the main functions of proxy servers?
Content caching, request filtering, login management, enhancing speed and reducing bandwidth usage, adding a security layer and enforcing policies
How do proxy servers protect against DDoS attacks?
By filtering and controlling incoming traffic
What are the main functions of sensors?
Monitoring, detecting, analyzing network traffic and data flow
What is the role of jump servers/jump box?
Secure gateways for system administrators to access devices in different security zones
How do jump servers help in incident response during cyber-attacks?
By speeding up the incident response process
What is port security?
Restricts device access based on MAC addresses
How does port security enhance network security?
Prevents unauthorized devices from connecting
What is a network switch?
Networking device that operates at Layer 2 of the OSI model
How do network switches make traffic switching decisions?
Using MAC addresses through transparent bridging
What is the purpose of a CAM table?
To remember connected devices based on MAC addresses
How does a network switch increase security?
By broadcasting traffic only to intended receivers
What is the purpose of Port Security Implementation?
Associate specific MAC addresses with interfaces to prevent unauthorized devices
What is a potential vulnerability of Port Security Implementation?
Susceptible to MAC spoofing attacks
What is the purpose of 802.1x Authentication?
Provides port-based authentication for wired and wireless networks
What are the three roles involved in 802.1x Authentication?
Supplicant, Authenticator, Authentication server
What protocols are utilized for actual authentication in 802.1x Authentication?
RADIUS or TACACS+
What is the difference between RADIUS and TACACS+?
RADIUS is cross-platform, while TACACS+ is Cisco proprietary
What are the advantages of using TACACS+?
Offers additional security and independently handles authentication, authorization, and accounting
What is the difference in protocol support between RADIUS and TACACS+?
TACACS+ supports all network protocols, whereas RADIUS lacks support for some
What is EAP?
A framework for various authentication methods
What is the authentication process used in EAP-MD5?
Challenge handshake authentication process
What is the one-way authentication process?
Doesn’t provide mutual authentication
What is EAP-TLS?
Uses public key infrastructure with a digital certificate installed on both client and server
What is EAP-TTLS?
Requires a digital certificate on the server, but not on the client
What is EAP-FAST?
Uses protected access credential for mutual authentication
What is PEAP?
Supports mutual authentication using server certificates
What are Active Directory databases used for?
To authenticate a password from the client
What is EAP-LEAP?
Cisco proprietary and limited to Cisco devices
What does integrating EAP with port security and 802.1X enhance?
Network security
What do VPNs do?
Extend private networks across public networks
What are the different types of VPN configurations?
Site-to-site, client-to-site, and clientless
What is a site-to-site VPN?
Connects two sites cost-effectively
What are the benefits of using a site-to-site VPN?
Replaces expensive leased lines
How does a site-to-site VPN work?
Utilizes a VPN tunnel over the public internet
What is the main advantage of a site-to-site VPN?
Encrypts and secures data between sites
What are the characteristics of a client-to-site VPN?
Connects a single host (e.g., laptop) to the central office
What is a common use case for a client-to-site VPN?
Ideal for remote user access to the central network
What are the configuration options for a client-to-site VPN?
Full tunnel and split tunnel configurations
What is a clientless VPN?
Uses a web browser to establish secure, remote-access VPN
How does a clientless VPN differ from other VPN types?
No need for dedicated software or hardware client
What protocols does CompTIA Security+ use for secure connections to websites?
HTTPS and TLS
What are the differences between a full tunnel VPN and a split tunnel VPN?
Full tunnel encrypts all network requests, split tunnel only encrypts specific requests
What are the advantages of using a full tunnel VPN?
Provides high security, limits access to local resources
When is a split tunnel VPN configuration suitable?
Remote access to central resources
What does split tunneling do?
Divides traffic, routing some through the VPN, some directly to the internet
Why is split tunneling recommended for better performance?
Enhances performance by bypassing VPN for non-central traffic
What is one drawback of using split tunneling?
Less secure; potential exposure to attackers
When should caution be exercised when using split tunneling?
Requires caution on untrusted networks
What is TLS?
Provides encryption and security for data in transit
What is TLS commonly used for in web browsers?
Secure connections (HTTPS)
What protocol does TLS use for secure connections between a client and a server?
Transmission Control Protocol (TCP)
What is DTLS?
A faster UDP-based alternative for secure connections
What does DTLS protect against in clientless VPN connections?
Eavesdropping
What is IPSec used for?
Provides confidentiality, integrity, authentication, and anti-replay protection
What are the five key steps in establishing an IPSec VPN?
Request to start IKE, Authentication (IKE Phase 1), Negotiation (IKE Phase 2), Data transfer, Tunnel termination
What are the two IPSec tunneling modes?
Transport Mode, Tunnel Mode
What is the purpose of tunneling mode in VPNs?
Encapsulates the entire packet
What are the benefits of using tunneling mode in VPNs?
Confidentiality for payload and header, authentication, integrity, encryption
What is the difference between AH and ESP in IPSec?
AH provides connectionless data integrity and data origin authentication, while ESP provides confidentiality, integrity, encryption, and replay protection
What are the considerations when choosing a VPN tunnel type?
Balance between security and performance, full tunnel for higher security but reduced local access, split tunnel for better performance but potentially lower security
What is the purpose of SD-WAN?
Efficiently routes traffic between remote sites, data centers, and cloud environments
What are the benefits of SD-WAN?
Increased agility, security, and efficiency for geographically distributed workforces
What type of architecture does SD-WAN have?
Software-based architecture with control extracted from underlying hardware
What transport services can be used with SD-WAN?
MPLS, Cellular, Microwave links, Broadband internet
How does SD-WAN handle traffic routing?
Utilizes centralized control function for intelligent traffic routing
What are the differences between traditional WANs and SD-WAN?
Traditional WANs vs. SD-WAN
Which enterprises can benefit from SD-WAN?
Enterprises with multiple branch offices moving towards cloud-based services
What does SASE stand for?
Secure Access Service Edge
What is the purpose of SASE?
Addresses challenges of securing and connecting users and data across distributed locations
What key technology does SASE utilize?
Software-defined networking (SDN)
What are some components of SASE?
Firewalls, VPNs, Zero-trust network access, Cloud Access Security Brokers (CASBs)
How is policy and management delivered in SASE?
Through a common set of policy and management platforms
Which cloud providers offer services aligned with SASE?
AWS, Azure, Google Cloud
What are some cloud services that offer secure, flexible, and global networking capabilities?
Google Cloud VPN
Why is understanding and implementing SD-WAN and SASE important for organizations?
Enhanced security and successful migration to cloud-based environments
What are some considerations for infrastructure when it comes to device placement?
Proper placement of routers, switches, and access points
What are security zones?
Isolate devices with similar security requirements
What are screened subnets?
Act as buffer zones between internal and external networks
What is the purpose of a screened subnet?
Hosts public-facing services, protecting core internal networks
What term is used for modern DMZ?
Screened subnet
What does the term ‘attack surface’ refer to?
Points where unauthorized access or data extraction can occur
How does a larger attack surface affect vulnerability risk?
Increases the risk of vulnerabilities
What can be done to reduce the attack surface?
Identify and mitigate vulnerabilities
What should be done regularly for network security?
Assess and minimize the attack surface
What factors should be considered when choosing connectivity methods?
Scalability, speed, security, and budget constraints
What are active devices?
Monitor and act on network traffic
What are passive devices?
Observe and report without altering traffic
What are inline devices?
Devices that are in the path of network traffic
What is the key principle of Least Privilege?
Users and systems should have only necessary access rights