What are the 3 types of firewalls and what are the differences?
Stateless Packet-Filtering: Has a set of rules for in- and outbound traffic, that are blindly followed.
Stateful Packet-Filtering: Also has a set of rules of in- and outbound traffic, but if I send a request out, the firewall knows that and lets the incoming response in, even if it otherwise would have been blocked.
Next-Gen Firewalls (NGFW): Runs on Layers 5-7 and thus can do way deeper packer inspections and be way more precise. They mostly use ACLs.
What is a UTM?
A Unified Threat Management Device (UTM): Combines all types of protection into one device. It includes firewall, router, IDS/IPS, anti-malware etc.
It can be software, hardware, on premise or in the cloud.
What are 4 basic best practices for ACL rules?
What are the 3 most important segmentation zones?
What is a Bastion Host and a Jumpbox?
Bastion Host: A host running on the screened subnet and is NOT running anything serving the local network.
Jumpbox: A server in the screened subnet that works as entry point from the local network to connect to devices in the screened subnet. As the only entry point, it needs to be well hardened.
What are the 4 main categories of IoT devices?
What are the 7 steps to remain secure with IoT devices?
What are ICSs & SCADA?
Industrial Control Systems (ICS) are used to control Operational Technology (OT) like manufacturing machines etc. separated from the IT network.
SCADAs are a type of ICS that is used to manage large scale multi-site devices, spread over many geographical locations, controlled from a computer.
What are the Control and the Data Plane in Zero Trust?
Control Plane: Framework responsible for defining, managing and enforcing policies.
Data Plane: Used to properly implement zero trust architecture.
What are the 4 integral parts of Zero Trust?
Whats the difference between Full & Split Tunnel VPN?
Full Tunnel: All traffic gets encrypted and routed through the VPN.
Split Tunnel: Only traffic which is for the office you want to connect to with the VPN gets encrypted and routed through the VPN tunnel & all other traffic goes out directly.
What are the 3 older VPN protocols and whats the main protocol?
Layer2 Tunneling Protocol (L2TP): Lacks security and encryption features.
Layer2 Forwarding (L2F): Provides tunneling for P2P protocol. No encryption.
Point to Point Tunneling Protocol (PPTP): Supports dial up networks but lacks security by default.
The best and most secure protocol is IPSec.
What are the 6 main remote access management protocols and their ports??
What is In/Out of Band management?
With In Band Management you are configuring devices from inside the network.
Out of Band Management has a separate network for configuring devices, so regular users cannot connect to management consoles. Using the console port on a device also counts as Out of Band.