What does an Intrusion Detection System (IDS) do?
IDS is a device that monitors for malicious activity, as well as any kind of policy violation.
It collects the data and then can generate a report in terms of what is actually going on with respect to your network communications.
What does an Intrusion Prevention System (IPS) do?
IPS continuously monitors network traffic for malicious activity and takes automated actions to prevent threats in real time
Compare Network Intrusion Detection System (NIDS) vs Host-based Intrusion Detection System (HIDS)?
What are Signature-based intrusion detection systems?
Signature-based IDS identifies threats by comparing network traffic or system activity against a database of known attack patterns, referred to as signatures
What are Anomaly-based intrusion detection systems?
Anomaly-based IDS identifies unusual system behaviors that may indicate threats in a given network.
It can take some time for an intrusion detection system to understand what is normal in your environment; in that learning period the Anomaly-based method can generate a lot of false positives
What is Voice over Internet Protocol (VoIP)?
VoIP a technology that allows voice communication over the internet instead of traditional phone lines. It converts analog voice signals into digital data packets and transmits them using IP networks.
What does Session Initiation Protocol (SIP) do in relation to VoIP?
SIP is simply the protocol that is the carrier for VoIP.
What is a VoIP gateway?
VoIP gateway a hardware device that converts voice signals between the phone systems and digital VoIP networks, enabling seamless communication across both.
What is the purpose of a Private Branch Exchange (PBX) in a VoIP environment?
PBX handles the VoIP-to-analog signal conversion that is necessary to make calls on the Public Switched Telephone Network (PSTN)
The PBX was the device that also acted as a switch to route those calls to the correct extensions.
What are some benefits of a VoIP network?
This is a very reliable infrastructure because it just uses standard Ethernet networks, which in turn makes it very cost-effective.
You don’t have to purchase any additional equipment other than the phones themselves, if you are still using traditional analog phones
What is Trunking on a VoIP network?
Trunking on a VoIP network refers to the consolidation of multiple voice channels into a single digital connection, allowing efficient and scalable communication over the internet
What does an On-premises VoIP configuration look like?
On-premises configuration:
What is Wi-Fi Protected Access 2 (WPA2) encryption?
WPA2 replaced the vulnerability of WEP and interim WPA protocols. Its most notable features include AES encryption, a 4-way handshake, backward compatibility, and two-modes of operation (personal & enterprise)
WPA2 Personal uses a pre-shared key (PSK + AES) | Enterprise provides user-level server authentication for enterprise-level security
What is Wi-Fi Protected Access 3 (WPA3) encryption?
WPA3 is the current security protocol, offering new features like stronger encryption, enhanced protection against password cracking and brute force attacks, as well as, simplified setup for smart devices (Wi-Fi easy connect)
WPA3’s main improvement over WPA2 is Simultaneous Authentication of Equals (SAE) | SAE provides forward secrecy, mutual authentication, dynamic key generation, and a few additional features making WPA3 the safest encryption option
What is Administrative Distance?
Administrative distance helps the router decide which route to install in the routing table when there are competing paths from different routing protocols
What is Prefix Length?
Prefix length refers to the number of bits in an IP address that represent the network portion of the address
What is Metric in the context of route selection?
Metric a value used by routing protocols to determine the best path to a destination network.
What is the Switch Virtual Interface (SVI)?
SVI a virtual Layer 3 interface configured on a Layer 2 switch to enable IP-based communication between VLANs or with external networks