Section 3.2 Flashcards

1
Q

What are security zones?

A

Security zones allows us to zone the devices in our network based on their use or access type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is the Attack Surface?

A

Attack surface is the combination of potential openings into our surface. Different attack surfaces may be:
- application code
- authentication process
- open ports
- human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain IPS

A

Intrusion Prevention System watches network traffic and prevents intrusion through exploits to OS, application etc by different attack types such as buffer overflows, XSS, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain IDS

A

Intrusion Detection System sends an alert if an intrusion occurs in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Fail-open mode?

A

When a system fails, data continues to flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Fail-closed mode?

A

When a system fails, data does not flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is active monitoring solution?

A

System is connected inline and data can be blocked in real time as it passes by the IPS system. This is commonly used when real time monitoring and security is desired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a passive monitoring solution?

A

System sends a copy of the network traffic to the IPS to monitor the traffic, but since this is a copy of the data, the IPS cannot block traffic in real time. Mostly used when the system wants to be easier on blocking traffic in case the IPS blocks good traffic by accident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a jump server?

A

A jump server is a device in the inside of the network that is usually accessible from the outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a proxy server?

A

A proxy server sits between the users and the external network. The proxy server receives the user requests and sends the request on their behalf to the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is EAP?

A

Extensible Authentication Protocol (EAP) is an authentication framework that is part of port security.

EAP integrates with 802.1X which prevents access to the network until the authentication succeeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is NAC?

A

Port Based Network Access Control (NAC) is another way to say 802.1X, which means that you dont get access to the network until you authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a UTM?

A

Unified Threat Management (UTM) device has features such as URL filtering, malware inspection, spam filters, firewall, IDS/IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NGFW?

A

Next-generation Firewall (NGFW) operate at OSI Layer 7 and are able to examine all traffic passing the network, determine what applications are being used based on the traffic type, and set controls based on specific services or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a WAF?

A

Web Application Firewall (WAF) monitors web based inputs such as HTTPS/HTTP and puts rules to allow or deny based on expected input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN?

A

Virtual Private Network (VPN) encrypts all of the private data and sends it to its destination across the public network.

16
Q

What is SASE?

A

Secure Access Service Edge (SASE) is the next generation VPN which allows the secure connection to cloud services from different locations. SASE clients are installed on all devices and can communicate to the cloud by using the SASE infrastructure.

17
Q

What’s the best use of VPN?

A

VPN is mostly used for user access to a specific location.

18
Q

What is the best use of IPsec?

A

IPsec is mostly used for site to site access.

19
Q

What is the best use of SD-WAN?

A

SD-WAN manages the network connectivity to the cloud, without addressing security concerns.

20
Q

What is the best use of SASE?

A

SASE is mostly used for a complete network and security solution.