Security Infrastructure Flashcards

(39 cards)

1
Q

What does Security Infrastructure encompass?

A
  • Hardware
  • Software
  • Networks
  • Data
  • Policies

All components work cohesively for information asset safeguarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the types of firewalls.

A
  • Web Application
  • Unified Threat Management
  • Next-generation

These firewalls serve different purposes in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the mechanisms of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

A
  • Identifying trends
  • Showcasing signatures

IDS logs and alerts, while IPS takes action against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the functions of Network Appliances?

A
  • Load Balancing
  • Proxying
  • Monitoring
  • Security Enforcement

Specialized hardware or software for specific networking functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Port Security restrict?

A
  • Network access based on MAC addresses

It enhances security by preventing unauthorized devices from connecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What technologies are used for Securing Network Communications?

A
  • VPNs
  • IPSec
  • TLS

These technologies create a secure backbone for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Software-Defined Wide Area Networks (SD-WAN)?

A

Optimize WAN connections with software-defined principles

It enhances network performance and flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the aspects of Infrastructure Considerations?

A
  • Device placement
  • Security zones
  • Screen subnets
  • Attack surfaces

These aspects are crucial for network security architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Well-Known Ports.

A

Ports 0-1023 assigned by IANA for commonly-used protocols

These ports are essential for standard network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the key difference between IDS and IPS?

A

IDS logs and alerts; IPS logs, alerts, and takes action

This distinction is crucial for understanding their roles in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of Intrusion Detection Systems (IDS) exist?

A
  • Network-based IDS (NIDS)
  • Host-based IDS (HIDS)
  • Wireless IDS (WIDS)

Each type monitors different aspects of network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a Firewall do?

A

Monitors and controls network traffic based on security rules

It protects networks from unauthorized access and potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of Proxy Firewalls?

A
  • Session layer (Layer 5)
  • Application layer (Layer 7)

These proxies enhance security by making connections on behalf of endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of a Web Application Firewall (WAF)?

A

Inspects HTTP traffic to prevent web application attacks

It can be placed in-line or out of band for detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of Access Control Lists (ACLs)?

A
  • Protect networks from unwanted traffic
  • Control flow of traffic into and out of networks

ACLs consist of permit and deny statements based on port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the key pieces of information in ACL Rules?

A
  • Type of traffic
  • Source of traffic
  • Destination of traffic
  • Action to be taken

These elements define how traffic is managed in a network.

17
Q

What is a Network Appliance?

A

A dedicated hardware device with pre-installed software for specific networking services

Examples include load balancers and proxy servers.

18
Q

What does Port Security enhance?

A

Network security by preventing unauthorized devices from connecting

It restricts device access to specific ports based on MAC addresses.

19
Q

What are the five types of Anomaly-based Detection Systems?

A
  • Statistical
  • Protocol
  • Traffic
  • Rule or Heuristic
  • Application-based

These systems analyze traffic against a normal baseline to detect threats.

20
Q

What is the function of Jump Servers/Jump Box?

A
  • Secure gateways for system administrators
  • Control access and reduce attack surface area

They simplify logging and auditing and speed up incident response.

21
Q

What is the purpose of Port Security in network switches?

A

Restricts device access to specific ports based on MAC addresses

Enhances network security by preventing unauthorized devices from connecting.

22
Q

Network switches operate at which layer of the OSI model?

A

Layer 2

They use MAC addresses for traffic switching decisions through transparent bridging.

23
Q

What does the CAM Table (Content Addressable Memory) store?

A

MAC addresses associated with switch ports

Vulnerable to MAC flooding attacks, which can cause the switch to fail open.

24
Q

What are the three roles required for 802.1x Authentication?

A
  • Supplicant
  • Authenticator
  • Authentication server

Utilizes RADIUS for actual authentication, typically using EAP.

25
True or false: **RADIUS** is a Cisco proprietary protocol.
FALSE ## Footnote RADIUS is cross-platform, while TACACS+ is Cisco proprietary.
26
What does **EAP** stand for?
Extensible Authentication Protocol ## Footnote A framework for various authentication methods.
27
Which EAP variant uses public key infrastructure with a digital certificate?
EAP-TLS ## Footnote It uses mutual authentication.
28
What is the main purpose of a **VPN**?
Extend private networks across public networks ## Footnote Allows remote users to securely connect to an organization's network.
29
What is the difference between **Site-to-Site VPN** and **Client-to-Site VPN**?
* Site-to-Site: Connects two sites cost-effectively * Client-to-Site: Connects a single host to the central office ## Footnote Site-to-Site replaces expensive leased lines, while Client-to-Site is ideal for remote user access.
30
What does **Transport Layer Security (TLS)** provide?
Encryption and security for data in transit ## Footnote Used for secure connections in web browsers (HTTPS).
31
What is the purpose of **IPSec**?
A secure protocol suite for IP communication ## Footnote Provides confidentiality, integrity, authentication, and anti-replay protection.
32
What are the two modes of **IPSec Tunneling**?
* Transport Mode * Tunneling Mode ## Footnote Transport Mode uses the original IP header, while Tunneling Mode adds a new header.
33
What does **SD-WAN** stand for?
Software-Defined Wide Area Network ## Footnote A virtualized approach to managing and optimizing wide area network connections.
34
What is the purpose of **SASE**?
Combines network security and WAN capabilities in a single cloud-based service ## Footnote Addresses challenges of securing and connecting users and data across distributed locations.
35
What is the significance of **Security Zones**?
Isolate devices with similar security requirements ## Footnote Helps in managing security policies effectively.
36
What does the term **Attack Surface** refer to?
Points where unauthorized access or data extraction can occur ## Footnote A larger attack surface increases the risk of vulnerabilities.
37
What are the two failure modes to consider in device failures?
* Fail-open * Fail-closed ## Footnote Fail-open allows traffic during a failure, while fail-closed blocks all traffic.
38
What is the principle of **Least Privilege**?
Users and systems should have only necessary access rights ## Footnote Reduces the attack surface.
39
What is a **Risk-based Approach** in security controls?
Prioritize controls based on potential risks and vulnerabilities ## Footnote Ensures effective allocation of resources.