Untitled Flashcards Set

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What is Device Placement?

It’s the strategic positioning of network devices (e.g., firewalls, routers) within a network to maximize security.

2
New cards

What are Security Zones?

Network segments with distinct security policies, such as DMZ or internal networks.

3
New cards

Define Attack Surface.

All the vulnerable points in a network that are exposed to potential threats.

4
New cards

What is Fail-Open?

A configuration that allows network traffic through if the device fails, prioritizing availability.

5
New cards

Fail-Closed?

A configuration that blocks network traffic if the device fails, prioritizing security.

6
New cards

Active devices

devices (e.g., firewalls) interact with traffic

7
New cards

Inline

sit directly in the traffic path (e.g., IPS),

8
New cards

Jump Server?

A secure intermediary server providing access to a sensitive network segment.

9
New cards

Proxy Server.

A server that acts as an intermediary for requests between clients and servers, adding security and caching.

10
New cards

IPS

ctively blocks threats

11
New cards

What is a Load Balancer?

A device that distributes network traffic across multiple servers to prevent overload.

12
New cards

what is Port Security.

A method to control which devices can connect to physical network ports to prevent unauthorized access.

13
New cards

What does 802.1X do?

It’s a port-based network access control standard used with authentication protocols like EAP.

14
New cards

What is Extensible Authentication Protocol (EAP)?

A framework providing authentication methods for network access.

15
New cards

What is a Web Application Firewall (WAF)?

A firewall specifically designed to protect web applications from attacks like XSS and SQL injection.

16
New cards

What does Unified Threat Management (UTM) provide?

It combines multiple security functions like firewall, antivirus, and content filtering into one solution.

17
New cards

What is a Next-Generation Firewall (NGFW)?

A firewall with advanced features like deep packet inspection and application awareness.

18
New cards

Layer 4

filters by IP/port;

19
New cards

VPN

It creates an encrypted tunnel for secure remote access to a network.

20
New cards

Define Tunneling.

A method of encapsulating data within secure protocols for safe transmission.

21
New cards

TLS?

Encrypts data during transfer, ensuring confidentiality and integrity.

22
New cards

What is IPSec?

A protocol suite for securing IP communications with encryption and authentication.

23
New cards

SD-WAN.

A wide area network approach that dynamically manages connections for cost-effective and reliable performance.

24
New cards

What is Secure Access Service Edge (SASE)?

A cloud-based network security model combining SD-WAN with security services.

25
New cards

Effective Controls?

Choose security measures based on network needs for confidentiality, integrity, and availability.