Supporting And Troubleshooting Secure Networks Flashcards

1
Q

Enforcing a security zone by separating a segment of the network from access by the rest of the network. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped. Also referred to as Network Separation

A

Network Segmentation Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Segment isolated from the rest of a private network by one or more fire alls that accepts connections from the Internet over designated ports.

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software or hardware device that protects a system or net park by blocking unwanted network traffic.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-reputable addresses internally.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.

A

Port Address Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attacks progress rather than eliminating it outright.

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General term for the collected protocols policies and hardware that authenticate and authorize access to a network at the device level.

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host, network or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security policy concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security appliance or software that uses passive hardware sensors to monitor traffic on a specific segment of the network.

A

Intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security appliance or software that combines detection capabilities with functions that can actively block attacks.

A

Intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security framework and tools to facilitate use of personally winded devices to access corporate networks and data

A

Bring your on device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly