Section 3 - Implementation Flashcards

1
Q

Domain name system security extensions (DNSSEC)

A

Are a set of protocols that add a layer of security to the DNS lookup and exchange processes. In such a way, malicious activities like cache poisoning, pharming, and man-in-the-middle attacks can be prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PGP and S/MIME

A

The security protocols are created to secure the electronic mail facility. The primary distinction between these protocols is the type of algorithms utilized in their security mechanisms. PGP builds confidence between users by using either key rings or digital certificates. On the other hand, S/MIME makes use of digital signatures, message digests, encryption, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BPDU guard

A

An enhancement to STP, removes a node that reflects BPDUs back in the network. It enforces the STP domain borders and keeps the active topology predictable by not allowing any network devices behind a BPDU guard-enabled port to participate in STP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateless FW

A

Makes use of a data packet’s source, destination, and other parameters to figure out whether the data presents a threat. These parameters have to be entered by either an administrator or the manufacturer via rules they set beforehand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateful FW

A

Keeps track and monitors the state of active network connections while analyzing incoming traffic and looking for potential traffic and data risks. This firewall is situated at Layers 3 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Next-gen firewall (NGFW)

A

Includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unified threat management (UTM)

A

Approach to information security where a single hardware or software installation provides multiple security functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jump server

A

Hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless cryptographic protocols

A
  • WiFi Protected Access 2 (WPA2)
  • WiFi Protected Access 3 (WPA3)
  • Counter-mode/CBC-MAC Protocol (CCMP)
  • Simultaneous Authentication of Equals (SAE)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless authentication protocols

A
  • Extensible Authentication Protocol (EAP)
  • Protected Extensible Authentication Protocol (PEAP)
  • EAP-FAST
  • EAP-TLS
  • EAP-TTLS
  • IEEE 802.1X
  • Remote Authentication Dial-in User Service (RADIUS) Federation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

East-west traffic

A

Is the transfer of data packets from server to server within a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Term changes:
DMZ
Man-In-The-Middle Attack
Man trap
Black list
White list

A

Screened Subnet
On-path attack
Access control vestibule
block list
allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zero Trust

A

Security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network access control (NAC)

A

NAC prevents unauthorized users and devices from entering private networks.
Some NAC vendors require users to download agent software on their client devices. The agents then report device characteristics back to the NAC system.
Alternatively, agentless NAC solutions constantly scan the network and inventory devices, relying on device and user behaviors to trigger enforcement decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Out-of-band management

A

Networking term which refers to accessing and managing network infrastructure at remote locations, and doing it through a separate management plane from the production network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DHCP snooping

A

Security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The feature validates DHCP messages, filters, rate-limits, maintains untrusted hosts db