Section 11: Network Design Flashcards
What three kinds of attacks are switches susceptible to?
MAC Flooding, MAC Spoofing, and Physical Tampering
What is MAC Flooding
An attempt to overwhelm the memory in a switch
MAC Spoofing
Attacker masks their own MAC address to pretend they have the MAC address of another device
How do you prevent physical tampering?
Lock it up in a network rack.
Router
Connects two or more networks
Access Control List
An ordered set of rules that a router uses to decide what comes in and what doesn’t
IP Spoofing
Tricks an ACL
Most networks are broken up into three zones. What are they?
The LAN, the WAN, and the DMZ
DMZ
Focused on providing controlled access to publicly available servers that are hosted within your organizational network
Extranet
Specialized type of DMZ that is created for your partner organizations to access over a wide area network
Bastion Hosts
Hosts or servers in the DMZ which are not configured with any services that run on the local network
Jumpbox
A hardened server that provides access to other hosts within the DMZ
Network Access Control
Security technique in which devices are scanner to determined its current state prior to being allowed access onto a given network
Persistent Agents
A piece of software that is installed on the device requesting access to the network
Non-Persistent Agents
Uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan