Security Technologies Flashcards

1
Q

Firewall

A

Uses a set of rules defining the traffic types permitted or denied through device
▪ Software or hardware
▪ Virtual or physical
▪ Host-based or network-based
▪ Can perform Network Address Translation (NAT) and/or Port Address
Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stateful Firewall

A

Inspects traffic as part of a session and recognizes where the traffic
originated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NextGen Firewall (NGFW)

A

Third-generation firewall that conducts deep packet inspection and
packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control List (ACL)

A

Set of rules applied to router interfaces that permit or deny certain traffic
● Switch
o MAC address
● Router
o IP address
Switch Firewall
o IP address or port
▪ Source/destination IP
▪ Source/destination port
▪ Source/destination MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Zone

A

▪ Firewall interface in which you can set up rules
● Inside
o Connects to corporate LAN
● Outside
o Connects to the Internet
● Demilitarized Zone (DMZ)
o Connects to devices that should have restricted access
from the outside zone (like web servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unified Threat Management (UTM) Device

A

▪ Combines firewall, router, intrusion detection/prevention system, antimalware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Signature-based Detection

A

Signature contains strings of bytes (a pattern) that triggers detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Policy-based Detection

A

▪ Relies on specific declaration of the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Statistical Anomaly-based Detection

A

Watches traffic patterns to build baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-statistical Anomaly-based Detection

A

▪ Administrator defines the patterns/baseline
● Network-based (NIDS/NIPS)
o A network device protects entire network
● Host-based (HIDS/HIPS)
o Software-based and installed on servers and clients
▪ Network and host-based systems can work together for a more complete
protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Telnet Port 23

A

Sends text-based commands to remote devices and is a very old
networking protocol
▪ Telnet should never be used to connect to secure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Shell (SSH) Port 22

A

Encrypts everything that is being sent and received between the client
and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remote Desktop Protocol (RDP) Port 3389

A

Provides graphical interface to connect to another computer over a
network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

o Remote Desktop Gateway (RDG)

A

▪ Provides a secure connection using the SSL/TLS protocols to the server
via RDP
● Create an encryption connection
● Control access to network resources based on permissions and
group roles
● Maintain and enforce authorization policies
● Monitor the status of the gateway and any RDP connections
passing through the gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtual Private Network (VPN)

A

▪ Establishes a secure connection between a client and a server over an
untrusted public network like the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

o In-Band Management

A

Managing devices using Telnet or SSH protocols over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Out-of-Band Management

A

▪ Connecting to and configuring different network devices using an
alternate path or management network
▪ Prevents a regular user’s machine from connecting to the management
interfaces of your devices
▪ Out-of-band networks add additional costs to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Password Authentication Protocol (PAP)

A

Sends usernames and passwords in plain text for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Challenge Handshake Authentication Protocol (CHAP)

A

Sends the client a string of random text called a challenge which is then
encrypted using a password and sent back to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MS-CHAP

A

▪ Microsoft proprietary version that provides stronger encryption keys and
mutual authentication

21
Q

Extensible Authentication Protocol (EAP)

A

Allows for more secure authentication methods to be used instead of just
a username and a password
▪ Use EAP/TLS in conjunction with a RADIUS or TACACS+ server

22
Q

Virtual Private Networks (VPNs)

A

o Extends a private network across a public network and enables sending and
receiving data across shared or public networks
▪ Site to site
▪ Client to site
▪ Clientless

23
Q

Full Tunnel VPN

A

Routes and encrypts all network requests through the VPN connection
back to the headquarters

24
Q

Split Tunnel VPN

A

▪ Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet
● For best security, use a full tunnel
● For best performance, use a split tunnel

25
Q

Clientless VPN

A

Creates a secure, remote-access VPN tunnel using a web browser without
requiring a software or hardware client

26
Q

o Secure Socket Layer (SSL)

A

Provides cryptography and reliability using the upper layers of the OSI
model, specifically Layers 5, 6, and 7

27
Q

Transport Layer Security (TLS)

A

▪ Provides secure web browsing over HTTPS
▪ SSL and TLS use TCP to establish their secure connections between a
client and a server

28
Q

Datagram Transport Layer Security (DTLS)

A

UDP-based version of the TLS protocol which operates a bit faster due to
having less overhead

29
Q

Layer 2 Tunneling Protocol (L2TP)

A

Lacks security features like encryption by default and needs to be
combined with an extra encryption layer for protection

30
Q

Point-to-Point Tunneling Protocol (PPTP)

A

Supports dial-up networks but also lacks native security features except
when used with Microsoft Windows

31
Q

IP Security (IPSec)

A

Provides authentication and encryption of packets to create a secure
encrypted communication path between two computers

32
Q

Main Mode

A

Conducts three two-way exchanges between the peers, from the initiator
to the receiver
● First Exchange
o Agrees upon which algorithms and hashes will be used to
secure the IKE communications throughout the process
● Second Exchange
o Uses a Diffie-Hellman exchange to generate shared secret
keying material so that the two parties can prove their
identities
● Third Exchange
o Verifies the identity of the other side by looking at an
encrypted form of the other peer’s IP address

33
Q

Authentication methods used

A

▪ Encryption and hash algorithms used
▪ Diffie-Hellman groups used
▪ Expiration of the IKE SA
▪ Shared secret key values for the encryption algorithms

34
Q

Quick Mode

A

Only occurs after IKE already established the secure tunnel in Phase 1
using either main or aggressive mode

35
Q

Aggressive Mode

A

▪ Uses fewer exchanges, resulting in fewer packets and faster initial
connection than main mode
● Diffie-Hellman public key
● Signed random number
● Identity packet
● Negotiate the IPSec SA parameters protected by an existing IKE SA
● Establish IPSec SA
● Periodically renegotiate IPSec SAs to maintain security
● Perform additional Diffie-Hellman exchanges, if needed

36
Q

Diffie-Hellman Key Exchange

A

▪ Allows two systems that don’t know each other to be able to exchange
keys and trust each other
● PC1 sends traffic to PC2 and then RTR1 initiates creation of IPSec
tunnel

37
Q

Transport Mode

A

Uses packet’s original IP header and used for client-to-site VPNs
▪ By default, maximum transmission unit (MTU) size in most networks is
1500 bytes

38
Q

Tunneling Mode

A

Encapsulates the entire packet and puts another header on top of it
▪ For site-to-site VPNs, you may need to allow jumbo frames
● Transport
o Client to site
● Tunneling
o Site to site

39
Q

Simple Network Management Protocol (SNMP)
o Managed Device

A

Any device that can communicate with an SNMP manager known as the
management information base (MIB)
o Simple Network Management Protocol (SNMP) is used to send and receive data
from managed devices back to a centralized network management station
o Granular

40
Q

Management Information Base (MIB)

A

The structure of the management data of a device subsystem using a
hierarchical namespace containing object identifiers

41
Q

Verbose

A

SNMP traps may be configured to contain all the information about a
given alert or event as a payload

42
Q

SNMPv1 and SNMPv2

A

Use a community string to give them access to the device as their security
mechanism
▪ Default community strings of public (read-only) or private (read-write)
devices are considered a security risk

43
Q

SNMPv3

A

Provides three security enhancements which added integrity,
authentication, and confidentiality to the SNMP protocol
● Integrity
o message hashing
● Authentication
o source validation
● PoE+ 802.3at Confidentiality
o DES 56-bit encryption

44
Q

● Network Logging
o System Logging Protocol (Syslog)

A

▪ Sends system log or event messages to a central server, called a syslog
server
● Security Information Management (SIM)
● Security Event Management (SEM)
● Security Information and Event Management (SIEM)

45
Q

Traffic Log

A

▪ Contains information about the traffic flows on the network
▪ Traffic logs allow for investigation of any abnormalities

46
Q

Application Log

A

Contains information about software running on a client or server
● Informational
● Warning
● Error

47
Q

Security Information and Event Management (SIEM)

A

o Provides real-time or near-real-time analysis of security alerts generated by
network hardware and applications

48
Q
A