Section 11: Network Design Flashcards

1
Q

What three kinds of attacks are switches susceptible to?

A

MAC Flooding, MAC Spoofing, and Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MAC Flooding

A

An attempt to overwhelm the memory in a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC Spoofing

A

Attacker masks their own MAC address to pretend they have the MAC address of another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you prevent physical tampering?

A

Lock it up in a network rack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router

A

Connects two or more networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control List

A

An ordered set of rules that a router uses to decide what comes in and what doesn’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP Spoofing

A

Tricks an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Most networks are broken up into three zones. What are they?

A

The LAN, the WAN, and the DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DMZ

A

Focused on providing controlled access to publicly available servers that are hosted within your organizational network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extranet

A

Specialized type of DMZ that is created for your partner organizations to access over a wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bastion Hosts

A

Hosts or servers in the DMZ which are not configured with any services that run on the local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Jumpbox

A

A hardened server that provides access to other hosts within the DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Access Control

A

Security technique in which devices are scanner to determined its current state prior to being allowed access onto a given network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Persistent Agents

A

A piece of software that is installed on the device requesting access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Non-Persistent Agents

A

Uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most NAC is built on what standard?

A

802.1x

17
Q

What do VLANs do?

A

Segment the network, reduce collisions, organize the network, boost performance, increase security

18
Q

Switch Spoofing

A

Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN

19
Q

Double Tagging

A

Attacker adds an additional VLAN tag to create an outer and inner tag (prevented by moving all ports out of default group)

20
Q

Using ________ can help us secure our internal network by hiding our addresses

A

NAT

21
Q

Telephony

A

Term used to describe devices that provide voice communication to users

22
Q

Modem

A

A device that could modulate digital information into an analog signal for transmission over a standard dial-up phone line

23
Q

War Dialing

A

Dialing all sorts of numbers in order to gain access. You protect that by using the callback feature

24
Q

Public Branch Exchange (PBX)

A

Internal phone system used in large organizations