Section 3.3 Implementing secure network designs Flashcards

1
Q

What provide a first line of defense for detection and prevention attacks at your network border?

A

Network security devices and secure network design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a network device that helps evenly distribute the flow of network traffic to other network devices, either in an active/active mode or an active/passive mode?

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If one router receives too many requests what could happen?

A

A bottleneck or network delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are required to analyze incoming requests and route them evenly between servers?

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can schedule their functions through different techniques or can use intelligent methods to detect which servers are overloaded and which are free?

A

Load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What prevent DoS network attacks by detecting floods of network packets and prevents them from overloading a device?

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What enhances load balancing by making routing the resources of all servers so they can be used to perform the same task as one server?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In what mode of load balancing do the load balancers act like an array, dealing with traffic together as both are active?

A

Active/Active mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What eliminates a host’s dependency upon individual network interfaces?

A

a Virtual IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web traffic comes into the network load balancer from the?

A

Virtual IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What NLB setting knows the status of all servers in the server farms and which web servers are the least utilized by using a scheduling algorithm?

A

Least Utilized Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What NLB setting takes the incoming request then contacts the DNS server and rotates the request based on the lowest IP address first?

A

DNS round Robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What NLB setting sends the request to the same web server based on the requester’s IP address, IP + port, and/or session ID?

A

Affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you call a private network that is designed to host the information internal to the organization?

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do you call a section of an organization’s network that has been sectioned off to act as an intranet for the private network but also serves information to external business partners or the public internet?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call an extranet for public consumption that is typically labeled a DMZ or perimeter network?

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is used to control traffic and isolate static/sensitive environments?

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do you call a collection of devices that communicate with one another as if they made up a single physical LAN?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do you call a subnet that is placed between two routers or firewalls?

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Bastion hosts are located within which subnet?

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What extends a private network across a public network, enabling users and devices to send and receive data across shared or public networks as if their computing devices were directly connected to the private network?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the most secure VPN tunneling protocol that can use certificates, Kerberos authentication, or a pre-shared key?

A

L2TP/IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What VPN works with legacy systems and uses SSL certificates for authentication?

A

Secure Socket Layer VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What VPN uses certificates for authentication and just needs and HTML-5 compatible browser such as Opera, Edge, Firefox, or Safari?

A

HTML 5 VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What mode of VPN means all traffic both the internet and the corporate network run through the VPN?

A

Full Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What mode of VPN is used for traffic destined for the corporate network only and internet traffic is sent through its normal route?

A

Split Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In what kind of scenario is a connection initiated from a users PC or laptop for a connection of shorter duration?

A

Remote Access Scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What do you call a hierarchical naming system that resolves a hostname to an IP address?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of record is a text record used by DNS to prevent spam and confirm the email has come from the domain it appears to come from?

A

Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What type of record is used for mail servers?

A

MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What type of record is a DNS text that is used by ISPs to prevent malicious email, such as phishing or spear phishing attacks?

A

Domain-based Message Authentication, Reporting and Conformance (DMARC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What stores recently resolved DNS requests for later reuse, reducing calls to the DNS server?

A

DNS Cache

33
Q

What is a flat-file where name and IP pairs are stored on a client? Often checked before request is sent to DNS server.

A

Hosts File

34
Q

What normally maintains only the hostnames for domains it is configured to serve? It is said to be ‘authoritative’ for those domains.

A

DNS server

35
Q

What do you call DNS nameservers that operate in the root zone? They can also refer to requests to the appropriate Top-Level Domain (TLD) server.

A

Root Server

36
Q

What prevents unauthorized access to DNS records on the server? Each DNS record is digitally signed, creating an RRSIG (digitally signed record) record to protect against attacks.

A

DNSSEC

37
Q

What is it called when an attacker alters the domain-name-to-IP-address mappings in a DNS system to redirect traffic to a rogue system or perform DoS against a system?

A

DNS poisoning

38
Q

What is it called when an attacker sends false replies to a requesting system, beating the real reply from the valid DNS server?

A

DNS Spoofing

39
Q

What is it called when an attacked uses a captive portal such as a pay-for-use Wi-Fi hotspot?

A

DNS hijacking

40
Q

What kind of attack leverages similarities in character sets to register phony international domain names (IDNs) that appear legitimate to the naked eye?

A

Homograph attack

41
Q

After a remote client has authenticated, __________ checks that the device being used is patched and compliant with corporate security policies.

A

Network Access Control (NAC)

42
Q

What is it called when the operating system includes NAC as part of the operating system itself and no additional agent is required?

A

Agent-based/Agentless NAC

43
Q

What kind of management enables IT to work around problems that my be occurring on the network?

A

Out-of-band Management

44
Q

What kind of security turns off the port but limits the functionality of the switch?

A

Port security

45
Q

What kind of security authenticates users or devices by a certificate before the connection is made? Prevents an unauthorized device from connecting and allows an authorized device to connect.

A

802.1x

46
Q

What kind of protection prevents two or more connected switches from creating loops that create broadcast storms?

A

Loop protection

47
Q

What protocol prevents broadcast storms from happening by forwarding, listening, or blocking on some ports?

A

Spanning Tree Protocol (STP)

48
Q

What are the frames that contain information about the STP?

A

Bridge Protocol Data Units (BPDU)

49
Q

What kind of attack will try and spoof the root bridge so that the STP is recalculated?

A

BPDU attack

50
Q

What do you call a layer 2 security that prevents a rogue DHCP server from allocating IP addresses to a host on your network?

A

DHCP snooping

51
Q

What is used by a wireless access point to block access to all non-authorized devices?

A

MAC filtering

52
Q

What is a way some attackers get around MAC filtering?

A

MAC spoofing

53
Q

What network appliance is typically placed on a screened subnet and allows admins to connect remotely to the network?

A

Jump Server

54
Q

What network appliance is a server that controls requests from clients seeking resources on the internet or an external network?

A

Forward proxy

55
Q

What network appliance is placed on a screened subnet and performs the authentication and decryption of a secure session to enable it to filter the incoming traffic?

A

Reverse Proxy

56
Q

What kind of IDS can monitor activity on a single system only? A drawback is that attackers can discover and disable them.

A

Host based IDS

57
Q

What kind of IDS can monitor activity on a network, and isn’t as visible to attackers?

A

Network based IDS

58
Q

What type of IDS creates a baseline of activity to identify normal behavior and then measures system performance against the baseline to detect abnormal behavior? It can detect previously unknown attack methods.

A

Behavior-based

59
Q

What type of IDS system uses signatures similar to the signature definitions used by anti-malware software? Only effective against known attacks

A

Signature based

60
Q

What mode of operation has the NIDS/NIPS placed on or near the firewall as an additional layer of security?

A

Inline/In-band

61
Q

What mode of operation has the traffic not going through the NIDS/NIPs? Instead sensors and collectors forward alerts to the NIDS

A

Passive/Out of band

62
Q

What can be placed on a network to alert NIDS of any changes in traffic patterns on the network?

A

Sensors and collectors

63
Q

What do you call a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions? Like a TPM, but are often removable or external devices.

A

Hardware Security Module (HSM)

64
Q

What do you call a multifunction device (MFD) composed of several security features in addition to a firewall? More common in small and medium businesses.

A

Unified Threat Management (UTM)

65
Q

What do you call packet inspection that inspects and filters both the header and payload of a packed that is transmitted through an inspection point? Can detect protocol non-compliance, spam, viruses, and intrusions

A

Deep packet inspection

66
Q

What firewall state watches network traffic and restricts or blocks packets based on source and destination addresses or other static values? Typically faster and performs better under heavier traffic loads.

A

Stateless

67
Q

What firewall state can watch traffic streams from end to end? Better at identifying unauthorized and forged communications?

A

Stateful

68
Q

What firewall state is not aware of traffic patterns or data flows?

A

Stateless

69
Q

What firewall state is aware of communication paths and can implement various IP security functions such as tunnels and encryption?

A

Stateful

70
Q

What allows private subnets to communicate with other cloud services and the internet but hides the internal network from Internet users? Contains the Network Access Control List (NACL) for the private subnets.

A

Network Address Translation Gateway

71
Q

What looks at the content on the requested web page and blocks requests depending on filters? Used to block inappropriate content in the context of the situation.

A

Content/URL filter

72
Q

What type of firewall is one in which the vendor makes the license freely available and allows access to the source code, though it might ask for an optional donation?

A

Open source firewall

73
Q

What type of firewall offers no vendor support?

A

Open source firewall

74
Q

What type of firewalls are more expensive but tend to provide more/better protection and more functionality and support (at a cost)?

A

Proprietary

75
Q

What type of firewall is a piece of purpose-built network hardware?

A

Hardware firewall

76
Q

What type of firewall may offer more configurable support for LAN and WAN connections?

A

Hardware firewalls

77
Q

What type of firewall often has superior throughput vs software firewalls because it is designed for the speeds and connections common to an enterprise network?

A

Hardware firewalls

78
Q

What type of firewalls might you install on your own hardware?

A

Software firewalls