Section 2 - Secure Network Architecture Flashcards
What are common edge services
Firewalls
Routers
Load Balancers
NAT Gateway for Cloud VPC
useful for cloud computing and uses Elastic IP’s that can be remapped to another instance
Internet Gateway - is a VPC component allowing traffic between VPC and Internet
Mail Security - DCOM/SPF
DDoS Protection
Rate Limiting
WAF
Blackhole Routing - drops all traffic -
not ideal
CSP provide DDoS protection
DDoS Mitigation Software/Appliance
What is the difference between edge services vs application layer protection
Edge takes a broad approach to protecting network traffic by limiting protocols and traffic flows based on source and destination whereas application layer looks within the protocols to more fully interpret them.
They both can be combined or separate solutions
What type of firewall allow for inspection of the content of the protocol traffic
Next-Generation Firewall (NGFW)
What is the type of device/firewall that provides multiple security services in a single solution?
Unified Threat Management (UTM)
Content Filtering
DLP
SPAM
Anti-Virus
Geo-IP Filtering
What device provides for protocol-specific outbound traffic and which type of proxy requires client configuration
Forward/Transparent Proxy
Non-Transparent proxy - typically 8080
Transparent Proxy must be implemented on a switch or router to operate
What type of script allows a client to configure proxy settings and what protocol will allow for this
Proxy Autoconfiguration Script (PAC)
Web Proxy Autodiscovery (WPAD)
What type of proxy is in the line of traffic from the “outside-in”
Reverse Proxy
Used for performance improvement by caching web content similar to a load balancer
What are the deployment ways for a WAF
Network-Based - separate host configured for WAF
Host Based - runs on the same host as Web application server - ModSecurity is a popular which is Apache Based. for Application layer attacks
Cloud Based - provided by a service provider and delivered via a cloud platform . Less expensive than Network based on leverages expertly configured WAF Protection
What is the special-cloud based service that is used to centralize the functions provided by API’s
API Gateway - can be detached from main application
XML Gateway - better suited for API only with similar protection
What is the type of attack where a threat actor injects false resource records into a client or server cache to redirect a domain name to an IP Address of the attackers choosing and what can help mitigate against these types of attacks
DNS Spoofing or Poisoning
Domain Name Security Extensions (DNSSEC) - set of specifications designed to provide an added level of security to traditional DNS
To extend traditional DNS with DNSSEC functionality what type of resource record must be setup
Resource Record Set (RRset) - all resource records for a domain that have the same type and use the Zone Signing Key in order for it to be verified as trustworthy. The Zone Signing Key is also signed using a Key Signing Key
What two major tasks do VPN Performs
Creation of tunnel and protection of the data within it.
for example LT2P creates the tunnel and IPSec secures it
What is the general term for the collected protocols, policies and hardware that authenticate and authorize access to the network at a device level
Network Access Control (NAC)
understand the use of a quarantine network - VLAN Jail
What are the 3 analysis types of a NIDS
Signature Based
Anomaly Based - based on protocol
Behavior Based - learns traffic patterns
High volume of traffic and uses sensors and used Switched Port Analyzer (SPAN) port or port mirroring.
What is a method of sniffing where a hardware device into a cable to copy frames for analsys
Test Access Port (TAP)
What is the type of software that reviews system files to ensure that they have not been tampered with
File Integrity Monitoring (FIM)
is SNMP a secure protocol
Not really - community names are sent in plain text avoid v1 or v2
What is the Cisco developed means of reporting network flow information to a structured database. What is the equivalent of web standard
NetFlow -
sFlow - technically not a true flow protocol as it does not aggregate packets
What are some common methods for Segmentation of Networks
Subnetting
VLANs
What is the subnetting design that used two firewalls on either side of the DMZ
Screened Subnet
What is the broad term for how objects can interact with each other in layer 3 switches and routers
Access Control Lists
What is the difference between an Air Gapped Host and a Jump Box
Air Gapped is not physically connected to any network and is physically protected
Jump Box are specially configured, highly hardened and closely monitored used to perform administrative tasks or to access with servers
What describes the capability of isolating workload from one another and protecting them individually
Microsegmentation
Cloud Centric and designed for more East-West traffic flows
What is the general term and also within Azure for the creation of cloud resources within a private network that parallels the functionality of the same resources
Virtual Private Cloud (VPC) or Virtual Network (VNet) in Azure
In a cloud environment, what is used to control inbound/outbound traffic
NAC List or nackles - stateless so both inbound and outbound traffic flows must be explicitly defined
What works with NAC lists and are associated with individual instances and act as virtual firewalls
Policies/Security Groups
What describes the state and location of data to help isolate and protect it.
Data Zones
Raw Zone - data from multiple sources
Structure/Curated Zone - quality checked
Analytical Zone - used for practical purposes
What is the term for the defined perimeter of inside and outside called being deconstructed
Deperimeterization - well established barrier are breaking down to many initiatives such as cloud, wfh, etc.
What are the key tenants of Zero Trust Architecture
Everything is considered external and designs adopt the adage:
“never trust, always verify” and “assume breach”
Which NIST Publication defines ZTA
NIST 800-207
ZTA does not define security via network boundaries but instead via resources. this is where microsegmentation plays a key role
T or F in order to setup a VPC Peering between Cloud and on-premise you need to establish a VPN
True
What operates as guardians between two connected sites and are typically associated with military establishments
Cross Domain Solutions (CDS)