• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/84

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

84 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Logical topology

Remote. Backbone is over the internet

Physical topology

Phyiscal. The backbone is there with you.

Packet filtering

Only inspects header of packet

Stateful inspection

Based on prior conversations

Circuit level gateway.

Based on connection

Application level gateway

Based on user privileges/ rights

Ingress

From in secure area to out

Egress

From non secure area into secure area

Router ACL

Router access control list.


Filters by:


Source/ destination ip


Protocol


Or port

Collision domain

Multiple devices pointed to 1.


Pc to modem

Broadcast domain

Group of pcs belong to a network like a vpn

Like a vpn

What is a switch vulnerable to

ARP


VLAN HOPPING


SPANNING TREE DOS

What does a sw and router use to connect ip and mac?

LLC link layer control


Layer 2 and 3

Are VLANS seperate broadcast domains?

Yes

4 countermeasures for sw security

Spanning tree protocol


Firmware updates


Vlan configs


Disable unused ports

What is the purpose of a switch

To forward and move frames

What is a load balancer

Balances server clusters

How does a load balancer balance

load or content

What does a proxy server do

Sends and receives the requests on behalf of the user and replaces users ip with its own.

Where is the proxy server

Dmz in between the internal and external firewall

What are 5 purposes for a proxy server?

Caching


Load balance


Internet connectivity


Content filtering


Hiding ips.

What does a web security gateway do?

Web content filter (on net admin side)

What is a bastion host?

A standalone server in the dmz


Capable of defending itself

Network monitoring

Req baseline


Human based


Behaviour based

Unusually high traffic


Policy violations

Signature based

Based on known virus signatures

Anomaly based

Device based

Heuristic

Trend based

Protocol analyzers/sniffers

Captures network traffic packet lvl info to troubleshoot.


Can cause a risk

WAF Web application firewall

Device


Vm


Filter


Prevents xss and sql injection.

Utm

All in 1 device

Purpose of ARP table

On router


Links mac from mac table on sw to up on router

Purpose of mac table

Links mac addr on sw to arp table on rtr to get user an ip

What 3 things does port security do

Shutdown


Protect


Restrict

What is port knocking

Port appears closed


But is really open with secret handshake

What is 802.1x used for

Wireless access points


Switches


Closed environment network

What 4 things does 802.1x do

Peemit/deny connection


Control vlan access


Apply traffic Policy


Closes ports till authorized

What uses rule base management

Firewall


Ips ids


Proxy


Antivirus sw

5 things a firewall/ ACL does

allow connection


Allow if secured


Deny


Allowed must be specified


Blocks by default


Can vlans communicate without a router?

No

What does an acl do

Filter by packets


Source addr


Destination addr


Denies by default

What is an acl used for

Security management for router switch or firewall

What is the purpose of STP on a switch

Redundancy

What do flood guards do

Detects or blocks flooding


Prevents dos


What would you use for network segmentation

VLANS

Where is the dmz

Between local nw and internet

What should be in the dmz.

2 firewalls


Small nw with servers

What kind if servers should be in the dmz

Bastion hosts


Cache


Proxy


Web gateway


Data


Mail

Static Nat

1 for 1


Hides ip


1 public for 1 private addr

Dynamic nat

Pool of public ips available

Pat

Port address translation


One to many


One public address for multiple users

Apipa

If dhcp not available pc sets up automatically for a lan.

Remote access services

Ex remote desktop


Has encrypted tunnel


Uses vpn


Ipsec


Ssl

Remote authenication

Verify user id remotely


Ex radius. Tacacs


801.1x


Chap

NAC

Network access control


Checks users for compliance


Updates


Patches

SaaS

Software as a service


Allows user to use sw for a set period of time.

Paas

Platform as a service.


Delivery of computing platform


IaaS

Infrastructure as a service


Outsources it department.


You manage network but they own the equipment remotely

Private cloud

Belongs to 1 party

Public cloud

For use by anyone

Hyvrid cloud

Private and public

Community cloud

When 2 organizations work together and need to share data

What are the 2 protocols of ipsec

Ah authentication header


Esp encapsulating security protocol

What are the 2 modes of ipsec

Transport: only the payload is encrypted and or authenticated



Tunnel: entire ip packet is encrypted and or authenicated


What is the IKE protocol

Validates using hash value of the packet on both ends

What are the 3 domains of dns?

Top: .com


Registered: google


Sub: www.

What are the 4 protocols of tcp/ip

Ip


Tcp


Upd


Icmp

What do the 4 protocols of tcpip do?

Ip: routes traffic


Tcp: connection oriented


Udp: connectionless communication


Icmp: ping tracert

What is FCoE

Fibre channel over ethernet


Ethernet on line to outside


Fibre locally

What is the speed of FCoE?

10gbps

What is NAS

Network attached storage

What does netbois do?

Allows applications on different systems to communicate.

802.11a

5.0 ghz


Ofdm


54mbps

802.11b

2.4 ghz


Dsss


10mbps

802.11g

2.4 ghz


Ofdm/dsss


54mbps

802.11n

2.4/5.0 ghz


Ofdm


600 mbps


Mimo multi in multi out

802.11 ac

5 ghz


Ofdm


6.93gbps

WEP method and desc

Method: rc4


Bad/weak

Wpa method and desc

3des/tkip


Better than wep

Wpa2 method and desc

Aes/ccmp


Better than wpa

What is the best method out of the last 3?

Wpa2 enterprise

Wpa2 encryption method and keys

128 key and 48 bit iv


128 key and 48 bit ivAES/CCMP

Eap leap peap which is used and describe it

Peap


Only 1 auth cert needed on server


Combine encryption and hashing without error

Example of a captive portal

Airport wifi redirecting you to a portal