Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
84 Cards in this Set
- Front
- Back
- 3rd side (hint)
Logical topology |
Remote. Backbone is over the internet |
|
|
Physical topology |
Phyiscal. The backbone is there with you. |
|
|
Packet filtering |
Only inspects header of packet |
|
|
Stateful inspection |
Based on prior conversations |
|
|
Circuit level gateway. |
Based on connection |
|
|
Application level gateway |
Based on user privileges/ rights |
|
|
Ingress |
From in secure area to out |
|
|
Egress |
From non secure area into secure area |
|
|
Router ACL |
Router access control list. Filters by: Source/ destination ip Protocol Or port |
|
|
Collision domain |
Multiple devices pointed to 1. |
Pc to modem |
|
Broadcast domain |
Group of pcs belong to a network like a vpn |
Like a vpn |
|
What is a switch vulnerable to |
ARP VLAN HOPPING SPANNING TREE DOS |
|
|
What does a sw and router use to connect ip and mac? |
LLC link layer control Layer 2 and 3 |
|
|
Are VLANS seperate broadcast domains? |
Yes |
|
|
4 countermeasures for sw security |
Spanning tree protocol Firmware updates Vlan configs Disable unused ports |
|
|
What is the purpose of a switch |
To forward and move frames |
|
|
What is a load balancer |
Balances server clusters |
|
|
How does a load balancer balance |
load or content |
|
|
What does a proxy server do |
Sends and receives the requests on behalf of the user and replaces users ip with its own. |
|
|
Where is the proxy server |
Dmz in between the internal and external firewall |
|
|
What are 5 purposes for a proxy server? |
Caching Load balance Internet connectivity Content filtering Hiding ips. |
|
|
What does a web security gateway do? |
Web content filter (on net admin side) |
|
|
What is a bastion host? |
A standalone server in the dmz Capable of defending itself |
|
|
Network monitoring |
Req baseline Human based |
|
|
Behaviour based |
Unusually high traffic Policy violations |
|
|
Signature based |
Based on known virus signatures |
|
|
Anomaly based |
Device based |
|
|
Heuristic |
Trend based |
|
|
Protocol analyzers/sniffers |
Captures network traffic packet lvl info to troubleshoot. Can cause a risk |
|
|
WAF Web application firewall |
Device Vm Filter Prevents xss and sql injection. |
|
|
Utm |
All in 1 device |
|
|
Purpose of ARP table |
On router Links mac from mac table on sw to up on router |
|
|
Purpose of mac table |
Links mac addr on sw to arp table on rtr to get user an ip |
|
|
What 3 things does port security do |
Shutdown Protect Restrict |
|
|
What is port knocking |
Port appears closed But is really open with secret handshake |
|
|
What is 802.1x used for |
Wireless access points Switches Closed environment network |
|
|
What 4 things does 802.1x do |
Peemit/deny connection Control vlan access Apply traffic Policy Closes ports till authorized |
|
|
What uses rule base management |
Firewall Ips ids Proxy Antivirus sw |
|
|
5 things a firewall/ ACL does |
allow connection Allow if secured Deny Allowed must be specified Blocks by default |
|
|
Can vlans communicate without a router? |
No |
|
|
What does an acl do |
Filter by packets Source addr Destination addr Denies by default |
|
|
What is an acl used for |
Security management for router switch or firewall |
|
|
What is the purpose of STP on a switch |
Redundancy |
|
|
What do flood guards do |
Detects or blocks flooding Prevents dos |
|
|
What would you use for network segmentation |
VLANS |
|
|
Where is the dmz |
Between local nw and internet |
|
|
What should be in the dmz. |
2 firewalls Small nw with servers |
|
|
What kind if servers should be in the dmz |
Bastion hosts Cache Proxy Web gateway Data |
|
|
Static Nat |
1 for 1 Hides ip 1 public for 1 private addr |
|
|
Dynamic nat |
Pool of public ips available |
|
|
Pat |
Port address translation One to many One public address for multiple users |
|
|
Apipa |
If dhcp not available pc sets up automatically for a lan. |
|
|
Remote access services |
Ex remote desktop Has encrypted tunnel Uses vpn Ipsec Ssl |
|
|
Remote authenication |
Verify user id remotely Ex radius. Tacacs 801.1x Chap |
|
|
NAC |
Network access control Checks users for compliance Updates Patches |
|
|
SaaS |
Software as a service Allows user to use sw for a set period of time. |
|
|
Paas |
Platform as a service. Delivery of computing platform |
|
|
IaaS |
Infrastructure as a service Outsources it department. You manage network but they own the equipment remotely |
|
|
Private cloud |
Belongs to 1 party |
|
|
Public cloud |
For use by anyone |
|
|
Hyvrid cloud |
Private and public |
|
|
Community cloud |
When 2 organizations work together and need to share data |
|
|
What are the 2 protocols of ipsec |
Ah authentication header Esp encapsulating security protocol |
|
|
What are the 2 modes of ipsec |
Transport: only the payload is encrypted and or authenticated Tunnel: entire ip packet is encrypted and or authenicated |
|
|
What is the IKE protocol |
Validates using hash value of the packet on both ends |
|
|
What are the 3 domains of dns? |
Top: .com Registered: google Sub: www. |
|
|
What are the 4 protocols of tcp/ip |
Ip Tcp Upd Icmp |
|
|
What do the 4 protocols of tcpip do? |
Ip: routes traffic Tcp: connection oriented Udp: connectionless communication Icmp: ping tracert |
|
|
What is FCoE |
Fibre channel over ethernet Ethernet on line to outside Fibre locally |
|
|
What is the speed of FCoE? |
10gbps |
|
|
What is NAS |
Network attached storage |
|
|
What does netbois do? |
Allows applications on different systems to communicate. |
|
|
802.11a |
5.0 ghz Ofdm 54mbps |
|
|
802.11b |
2.4 ghz Dsss 10mbps |
|
|
802.11g |
2.4 ghz Ofdm/dsss 54mbps |
|
|
802.11n |
2.4/5.0 ghz Ofdm 600 mbps Mimo multi in multi out |
|
|
802.11 ac |
5 ghz Ofdm 6.93gbps |
|
|
WEP method and desc |
Method: rc4 Bad/weak |
|
|
Wpa method and desc |
3des/tkip Better than wep |
|
|
Wpa2 method and desc |
Aes/ccmp Better than wpa |
|
|
What is the best method out of the last 3? |
Wpa2 enterprise |
|
|
Wpa2 encryption method and keys |
128 key and 48 bit iv 128 key and 48 bit ivAES/CCMP |
|
|
Eap leap peap which is used and describe it |
Peap Only 1 auth cert needed on server Combine encryption and hashing without error |
|
|
Example of a captive portal |
Airport wifi redirecting you to a portal |
|