Terms 1.1 Flashcards

1
Q

Firewalls

A

Designed to isolate one network from another, it can be hardware or software, can be a standalone device or integrated into other devices like routers and switches. Typically used to block or liimit outside traffic from entering a network. Can also be placed internally to semgent one area from another, such as Accounting & Finance from the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routers

A

Connect different networks together and “routes” traffic between them. Decides whether to kepp traffic local or route to remote network based on source and destination addresses. Can be static or dynamically configured, dynamic routers talk to each other to communicate various routes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switches

A

Multiport connectivity devices that improve network efficiency. Switches differ from hubs, because they read MAC addresses and only send information to the correct port instead of all ports. Used on internal networks and do not provide routing functionality. Exception are layer 3 switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Load Balancers

A

Dynamically balance the load between devices. Typically servers, can be hardware or software based. In a web server enviornment it will choose the best performing server at that moment to send the load to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web security gateways

A

Proxy server with advanced features, virus scanning, prevent connections to inappropiate sites such as P2P or file-sharing sites like Dropbox, Box.net, also provides DLP(Data loss Prevention) which can analyze traffic for social security numbers or credit card numbers. Can block ActiveX controls Java applets, 3rd part cookies. Enables granular access to websites, like allowing access to Linkedin but not allowing you to job search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN concentrators

A

Creates a private network across a public network. VPN Security comes from tunneling protocol (I.e. PTTP) and encryption method (IPSec). Many VPN’s use two factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet filtering

A

Allows or blocks traffic based on port (Web traffic comes on port 80 or port 21 for FTP: No intelligence but easy to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proxy Firewall

A

Dual homed, meaning two network interfaces. Segments internal users from outside world. Masks IP address using NAT. Cache requests to improve speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stateful Packet Inspection Firewalls(SPI)

A

Examines packet and keeps packet table of every communication channel, tracks entire conversation. Only allows packets from a known active connection. Vulnerable to attack by overloading the State table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web Application Firewall(WAF) OSI Layer 7 (Application)

A

Designed with granluar rules specifically to analyze traffic to web servers and prevent typical attacks. SQL injection attacks, XSS(Cross-site-scripting), Forged HTTP requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Routing Protocols (4)

A

RIP-Routing Information Protocol, OSPF-Open Shortest Path First, EIGRP-Enhanced Interior Gateway Routing Protocol, BGP-Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN Tunneling Protocols (3)

A

L2TP (Layer 2 Tunneling protocol), PPTP(Point to Point Tunneling Protocol), IPSec(IP Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIDS & NIPS

A

Network Intrusion Detection System, Network Intrusion Prevention System

Active or Passive. Active systems take action when malicious activity is detected. Passive systems just record activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDS vs IPS

A

IDS-Been around awhile fairly common and easy to set up. Allows for reactive response.

IPS-Newer platform. Enables prevention (Blocking IP’s, Resetting TCP Connections)

False positives could affect legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Four approaches to IDS

A

Behavior-based, Signature based, Anomaly detection, heuristic IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Behavior based IDS

A

Variation in behavior, increased traffic, policy violations

17
Q

Signature based IDS

A

Uses attack signatures

18
Q

Anomaly Detection IDS

A

Learns what is normal then looks for deviations from the baseline

19
Q

Heuristic IDS

A

Utilizes algorithms to analyze traffic as it passes through