Security Infrastructure Flashcards

1
Q

What does Security Infrastructure encompass?

A

Hardware, software, networks, data, and policies working cohesively for information asset safeguarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the types of firewalls.

A
  • Web Application
  • Unified Threat Management
  • Next-generation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the mechanisms used by Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

A
  • Identifying trends
  • Showcasing signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What functions do Network Appliances serve?

A
  • Load Balancing
  • Proxying
  • Monitoring
  • Security Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the basis for Port Security?

A

Media Access Control (MAC) addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What technologies are used for securing network communications?

A
  • VPNs
  • IPSec
  • TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the objective of secure network communications?

A

Create a secure backbone for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define SD-WAN.

A

Optimize WAN connections with software-defined principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SASE stand for?

A

Secure Access Service Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are key aspects to consider in infrastructure?

A
  • Device placement
  • Security zones
  • Screen subnets
  • Attack surfaces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the failure mode options for security devices?

A
  • Fail-open
  • Fail-closed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the classifications of ports?

A
  • Inbound
  • Outbound
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a well-known port range?

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port is used for SSH?

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The protocol for secure web communication is _______.

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a firewall?

A

Monitors and controls network traffic based on security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a screened subnet?

A

Acts as a security barrier between external untrusted networks and internal trusted networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the types of firewalls.

A
  • Packet Filtering Firewalls
  • Stateful Firewalls
  • Proxy Firewalls
  • Kernel Proxy Firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What distinguishes a Next Generation Firewall (NGFW)?

A
  • Application-aware
  • Conducts deep packet inspection
  • Operates fast with minimal network performance impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Unified Threat Management (UTM)?

A

Combines multiple security functions in a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a Web Application Firewall (WAF) focus on?

A

Inspecting HTTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the two types of proxy firewalls?

A
  • Session layer (Layer 5)
  • Application layer (Layer 7)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the role of Access Control Lists (ACLs) in firewalls?

A

Essential for securing networks from unwanted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is required for configuring ACLs?

A

Order of ACL rules specifies the order of actions taken on traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does IDS stand for?

A

Intrusion Detection Systems

26
Q

What is the key difference between IDS and IPS?

A

IDS logs and alerts; IPS logs, alerts, and takes action

27
Q

What are the types of Intrusion Detection Systems (IDS)?

A
  • Network-based IDS (NIDS)
  • Host-based IDS (HIDS)
  • Wireless IDS (WIDS)
28
Q

What is the purpose of a network appliance?

A

Dedicated hardware device with pre-installed software for specific networking services

29
Q

What do load balancers do?

A

Distribute network/application traffic across multiple servers

30
Q

What is the function of proxy servers?

A
  • Content caching
  • Requests filtering
  • Login management
31
Q

What is port security?

A

A network switch feature that restricts device access to specific ports based on MAC addresses

32
Q

What does 802.1x provide?

A

Port-based authentication for wired and wireless networks

33
Q

What are the two main authentication protocols compared in RADIUS vs. TACACS+?

A
  • RADIUS is cross-platform
  • TACACS+ is Cisco proprietary
34
Q

What is EAP?

A

Extensible Authentication Protocol

35
Q

Fill in the blank: EAP-TLS uses _______ for mutual authentication.

A

public key infrastructure with a digital certificate

36
Q

What authentication method uses simple passwords and the challenge handshake authentication process?

A

D5

This method provides remote access authentication but does not ensure mutual authentication.

37
Q

What is EAP-TLS?

A

Uses public key infrastructure with digital certificates installed on both the client and server and provides mutual authentication.

38
Q

What does EAP-TTLS require for authentication?

A

A digital certificate on the server but not on the client, where the client uses a password for authentication.

39
Q

What type of authentication does EAP-FAST utilize?

A

Protected access credential instead of a certificate to establish mutual authentication.

40
Q

What is the purpose of PEAP?

A

Supports mutual authentication using server certificates and Active Directory databases to authenticate a password from the client.

41
Q

What is a characteristic of EAP-LEAP?

A

Cisco proprietary and limited to Cisco devices.

42
Q

What enhances network security when combining port security, 802.1X, and EAP?

A

Ensures only authenticated and authorized devices can access sensitive resources.

43
Q

What do Virtual Private Networks (VPNs) extend?

A

Private networks across public networks.

44
Q

What are the three types of VPN configurations?

A
  • Site-to-site
  • Client-to-site
  • Clientless
45
Q

What is the primary benefit of a Site-to-Site VPN?

A

Connects two sites cost-effectively and encrypts data between them.

46
Q

What is a Client-to-Site VPN used for?

A

Connects a single host to the central office, ideal for remote user access.

47
Q

What distinguishes a Clientless VPN?

A

Uses a web browser to establish secure remote access without dedicated software.

48
Q

Fill in the blank: A _______ VPN encrypts and routes all network requests through the VPN.

A

Full Tunnel

49
Q

What does a Split Tunnel VPN do?

A

Divides traffic, routing some through the VPN and some directly to the internet.

50
Q

True or False: Transport Layer Security (TLS) provides encryption and security for data in transit.

51
Q

What is the purpose of Internet Protocol Security (IPSec)?

A

Provides confidentiality, integrity, authentication, and anti-replay protection for IP communication.

52
Q

What are the five key steps in establishing an IPSec VPN?

A
  • Request to start the Internet Key Exchange (IKE)
  • Authentication - IKE Phase 1
  • Negotiation - IKE Phase 2
  • Data transfer
  • Tunnel termination
53
Q

What does IPSec Transport Mode use?

A

Original IP header and is suitable for client-to-site VPNs.

54
Q

What is the purpose of the Encapsulating Security Payload (ESP) in IPSec?

A

Provides confidentiality, integrity, encryption, and replay protection.

55
Q

What is SD-WAN?

A

A virtualized approach to managing and optimizing wide area network connections.

56
Q

What are the benefits of SD-WAN?

A
  • Increased agility
  • Enhanced security
  • Improved efficiency
57
Q

What is a key technology in SASE?

A

Utilizes software-defined networking (SDN) for security and networking services from the cloud.

58
Q

What components are included in SASE?

A
  • Firewalls
  • VPNs
  • Zero-trust network access
  • Cloud Access Security Brokers (CASBs)
59
Q

What does the term ‘attack surface’ refer to?

A

Points where unauthorized access or data extraction can occur.

60
Q

What are the two modes to handle device failures?

A
  • Fail-open
  • Fail-closed
61
Q

What is the principle of Least Privilege?

A

Users and systems should have only necessary access rights to reduce the attack surface.

62
Q

What is the purpose of conducting a Risk Assessment?

A

Regularly assess threats and vulnerabilities specific to your organization.