Section 1.1 Flashcards

1
Q

A device that can filter incoming and outgoing traffic.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Router

A

A device that connects multiple network segments into one.

Uses ACL (rules) to manage traffic between network segments.

A layer 3 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switches

A

A device used to connect computers together and learns which device is attached to which port.

A layer 2 device, some can also operate on layer three.

Used to create VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Load Balancer

A

A system that distribute traffic between multiple servers that provide the same service.

Provides increased availability of server services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a proxy server?

A

Proxy servers request services (ie HTTP, FTP, etc) on behalf of clients on a network.

They are capable of caching data to improve network performance by storing commonly requested data and supply it to clients when requested.

A proxy server is also capable of performing URL filtering, denying access to sites that are not authorized on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web security gateway

A

A type of UTM detects malicious software coming in as email attachments, as code embedded in websites, and spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN Concentrators

A

A server dedicated to VPN connections.

Deployed by large organizations.

Has strong encryption and authentication techniques, and can has support for a large number of clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol Analyser

A

Used to gather packets that are passed on a network.

Gathered packets can be analysed to see packet header information and packet payload.

This can be used to either detect malicious activities over the network, or it can be used by an attacker to gather information about the network and any information passed as cleartext.

Use is called Packet Sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Span Filter

A

Performed by either the email server or a UTM solution.

This helps prevent sending large amounts of junk data, the servers storing garbage data, and help prevents emails malicious scripts coming through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Web Application Firewall (WAF)?

A

A firewall designed to protect web applications.

Normally hosted on the web server.

Not to be used in place of a network based firewall since it only protects the web application and not the rest of the network.

Is an example of an Application level fire wall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main difference between IPS and IDS

A

An IPS is always placed in-line with the traffic so that it can prevent the attack from reaching the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between Active and Passive IDS

A

While both log and can notify personnel of alerts active systems will take actions to change the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IDS?
What are the two types?
What methods can it use to detect attacks?

A

Intrusion Detection System

Host-based (installed on a single host)
Network-based (installed on a router or firewall)

Signature Based (a.k.a. Definition-based)
Anomaly Based (a.k.a. Behaviour based or Heuristic based)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does signature based detection work?

A

Detects attacks based on known attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does anomaly detection work?

A

Detects attacks by comparing activity against a baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Honeypot?

A

A single host that is designed to be vulnerable to in order to draw attacks away from production systems, and should not hold any data that is deemed too sensitive.

Are used to gather information on attackers.

They should not be left completely vulnerable or else attackers might become aware to the deception.

Honeynets are the same thing, but for an entire network.

17
Q

List 3 methods of securing a Switch

A

Disable unused ports
Implement MAC filtering
Implement 802.1x
Physically block access to the switch

18
Q

What is MAC Filtering?

A

Assigning a specific MAC address to a port, or having the switch learn the MAC address of the first or second device connected to it; not allowing any other device to connect to the port.

19
Q

What is 802.1x?

A

An authentication protocol that uses either a RADIUS or Diameter Server.

Clients must be authenticated by the server prior to being granted access to the network.

Can be implemented in either a wired or wireless network.

20
Q

What is NAT?

A

Network Address Translation

Translates Public IP address to private IPs, and private IPs to public ones.

Used on internet facing devices

21
Q

What is PAT?

A

Port Address Translation

22
Q

What is a reverse proxy server?

A

A reverse proxy server acts in the opposite manner of a proxy server in that request come in from out side the network. The reverse proxy request the data from the servers on the network, and then it provides the data to the requesting client.

This provides an extra layer of protection for the internal servers.

23
Q

What is a UTM?

A

Universal Threat Management

Can provide:

  • -URL Filtering
  • -Malware Inspection
  • -Content Inspection