Section 7: Delving into Network and Security Concepts Flashcards
What is the purpose of a web application firewall, and where is it normally placed?
Web Application Firewall (WAF) is normally installed on or before a web server. It’s job is to protect web apps from attack.
What is Implicit Deny, and which two devices does it effect?
Used by both the firewall and the router. If there is no allow rule, they get the last rule, which is deny all.
What is the firewall that does content filtering, URL filtering, and malware inspection?
Unified Threat Management (UTM), provides value for money.
Which network device connects two networks?
Router. Works at Layer 3, Network Layer.
Which type of internal device connects users on the same network?
Switch. Normally in a star topology. Works at Layer 2, Data Link Layer.
Which type of device hides the internal network from hackers on the internet?
Network Address Translator (NAT).
What does an inline NIPS do?
Screens incoming traffic.
Which type of IPS protects virtual machines from attack?
Host-Based IPS (HIPS). Installed on the guest VM or computer.
Which type of of IPS is placed behind the firewall as an additional layer of security?
Network-Based IPS (NIPS). Prevents unauthorized access to the network.
If you don’t have a NIDS on your network, which device can passively monitor network traffic?
NIPS can fulfill functionality of a NIDS.
What is the difference between a signature and anomaly-based NIDS?
Signature-based: works off a known of variants.
Anomaly-based: starts with the database and can learn about new patterns or threats. Also known as heuristic.
What is the passive device that sits on your internal network?
NIDS. Can detect changes to your network using sensors and collectors.
If you receive an alert that server 1 has a virus, and you inspect the server to find there are no viruses, what is this known as?
False positive.
How can you prevent someone from accessing a medical center’s network by plugging their laptop into a port in the waiting room?
Enable port security, where you turn the port off on the switch.
How can you prevent someone from plugging a rouge access point into your network?
Enable 802.1x, which ensures that the device is authenticated before being able to use the port.
How do 802.1x and port security differ? Which one gives me more functionality?
A managed switch uses 802.1x, which authenticates the device but does not disable the port.
Port security disables the port.
What is the purpose of web caching on a proxy server?
Keeps copies of the web pages locally, ensuring faster access to the web pages and preventing the need to open a session to the internet.
What is the purpose of a VPN?
Create a tunnel across unsafe networks from home or a hotel to the workplace.
What happens in the IKE phase of a VPN session?
Diffie Hellman, using port 500, sets up a secure session before the data is transferred.
What is the purpose of a VPN concentrator?
Set up a secure session for a VPN.