What does Security Infrastructure encompass?
All components work cohesively for information asset safeguarding.
Name the types of firewalls.
These firewalls serve different purposes in network security.
What are the mechanisms of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
IDS logs and alerts, while IPS takes action against threats.
What are the functions of Network Appliances?
Specialized hardware or software for specific networking functions.
What does Port Security restrict?
It enhances security by preventing unauthorized devices from connecting.
What technologies are used for Securing Network Communications?
These technologies create a secure backbone for communication.
What is the purpose of Software-Defined Wide Area Networks (SD-WAN)?
Optimize WAN connections with software-defined principles
It enhances network performance and flexibility.
What are the aspects of Infrastructure Considerations?
These aspects are crucial for network security architecture.
Define Well-Known Ports.
Ports 0-1023 assigned by IANA for commonly-used protocols
These ports are essential for standard network services.
What is the key difference between IDS and IPS?
IDS logs and alerts; IPS logs, alerts, and takes action
This distinction is crucial for understanding their roles in network security.
What types of Intrusion Detection Systems (IDS) exist?
Each type monitors different aspects of network security.
What does a Firewall do?
Monitors and controls network traffic based on security rules
It protects networks from unauthorized access and potential threats.
What are the two types of Proxy Firewalls?
These proxies enhance security by making connections on behalf of endpoints.
What is the function of a Web Application Firewall (WAF)?
Inspects HTTP traffic to prevent web application attacks
It can be placed in-line or out of band for detection.
What is the purpose of Access Control Lists (ACLs)?
ACLs consist of permit and deny statements based on port numbers.
What are the key pieces of information in ACL Rules?
These elements define how traffic is managed in a network.
What is a Network Appliance?
A dedicated hardware device with pre-installed software for specific networking services
Examples include load balancers and proxy servers.
What does Port Security enhance?
Network security by preventing unauthorized devices from connecting
It restricts device access to specific ports based on MAC addresses.
What are the five types of Anomaly-based Detection Systems?
These systems analyze traffic against a normal baseline to detect threats.
What is the function of Jump Servers/Jump Box?
They simplify logging and auditing and speed up incident response.
What is the purpose of Port Security in network switches?
Restricts device access to specific ports based on MAC addresses
Enhances network security by preventing unauthorized devices from connecting.
Network switches operate at which layer of the OSI model?
Layer 2
They use MAC addresses for traffic switching decisions through transparent bridging.
What does the CAM Table (Content Addressable Memory) store?
MAC addresses associated with switch ports
Vulnerable to MAC flooding attacks, which can cause the switch to fail open.
What are the three roles required for 802.1x Authentication?
Utilizes RADIUS for actual authentication, typically using EAP.