Network Segmentation Flashcards

(14 cards)

1
Q

What are the 3 types of firewalls and what are the differences?

A

Stateless Packet-Filtering: Has a set of rules for in- and outbound traffic, that are blindly followed.

Stateful Packet-Filtering: Also has a set of rules of in- and outbound traffic, but if I send a request out, the firewall knows that and lets the incoming response in, even if it otherwise would have been blocked.

Next-Gen Firewalls (NGFW): Runs on Layers 5-7 and thus can do way deeper packer inspections and be way more precise. They mostly use ACLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a UTM?

A

A Unified Threat Management Device (UTM): Combines all types of protection into one device. It includes firewall, router, IDS/IPS, anti-malware etc.
It can be software, hardware, on premise or in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 basic best practices for ACL rules?

A
  1. Block all requests from internal/private loopback IPs and multicast IPs that come from the internet.
  2. Block incoming traffic from protocols that should be only used locally
  3. If youre not using IPv6, block all IPv6 traffic.
  4. Include a deny all entry at the end of the ACL to only allow what is specifically allowed in the rules above.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 most important segmentation zones?

A
  1. The trusted Zone: Inside the LAN, inbound traffic only allowed if requested.
  2. Screened Subnet: In-between zone with mail- and webservers etc. Some inbound traffic is allowed, but because of that its separated from the trusted zone.
  3. Untrusted zone: The internet and other external networks. No inbound traffic from there unless requested from the trusted or screened zone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Bastion Host and a Jumpbox?

A

Bastion Host: A host running on the screened subnet and is NOT running anything serving the local network.

Jumpbox: A server in the screened subnet that works as entry point from the local network to connect to devices in the screened subnet. As the only entry point, it needs to be well hardened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 main categories of IoT devices?

A
  • Hub & Control Systems
  • Smart devices
  • Wearables
  • Sensors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 7 steps to remain secure with IoT devices?

A
  • Understand endpoints
  • Track & Manage devices
  • Patch vulnerabilities
  • Conduct a pentest
  • Change default creds
  • Use encryption
  • Segment IoT from the rest
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ICSs & SCADA?

A

Industrial Control Systems (ICS) are used to control Operational Technology (OT) like manufacturing machines etc. separated from the IT network.
SCADAs are a type of ICS that is used to manage large scale multi-site devices, spread over many geographical locations, controlled from a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Control and the Data Plane in Zero Trust?

A

Control Plane: Framework responsible for defining, managing and enforcing policies.

Data Plane: Used to properly implement zero trust architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 integral parts of Zero Trust?

A
  1. Subject System
  2. Policy Engine
  3. Policy Admin
  4. Policy Enforcement Point
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whats the difference between Full & Split Tunnel VPN?

A

Full Tunnel: All traffic gets encrypted and routed through the VPN.

Split Tunnel: Only traffic which is for the office you want to connect to with the VPN gets encrypted and routed through the VPN tunnel & all other traffic goes out directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 older VPN protocols and whats the main protocol?

A

Layer2 Tunneling Protocol (L2TP): Lacks security and encryption features.

Layer2 Forwarding (L2F): Provides tunneling for P2P protocol. No encryption.

Point to Point Tunneling Protocol (PPTP): Supports dial up networks but lacks security by default.

The best and most secure protocol is IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 6 main remote access management protocols and their ports??

A
  1. Telnet, Port 23
  2. SSH, Port 22
  3. Remote Desktop Protocol (RDP), Port 3389
  4. Remote Desktop Gateway (RDG), Gateway for secure RDP connections
  5. Virtual Network Computing (VNC), Port 5900, like RDP but cross platform
  6. Virtual Desktop Infrastructure (VDI), delivers virtual desktop over network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is In/Out of Band management?

A

With In Band Management you are configuring devices from inside the network.

Out of Band Management has a separate network for configuring devices, so regular users cannot connect to management consoles. Using the console port on a device also counts as Out of Band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly