Segmentation and Access Control - CompTIA Security+ SY0-701 - 2.5

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:51 AM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

6 Terms

1
New cards

Segmenting the network

• Physical, logical, or virtual segmentation

• Devices, VLANs, virtual networks

• Performance - High-bandwidth applications

• Security

• Users should not talk directly to database servers

• The only applications in the core are SQL and SSH

• Compliance

• Mandated segmentation (PCI compliance)

• Makes change control much easier

2
New cards

Access Control Lists (ACLs)

• Allow or disallow traffic based on tuples

- Groupings of categories

- Source IP, Destination IP, port number, time of day,

application, etc.

• Restrict access to network devices

- Limit by IP address or other identifier

- Prevent regular user / non-admin access

• Be careful when configuring these

- You can accidentally lock yourself out

3
New cards

Access control list

List the permissions

- Bob can read files

- Fred can access the network

- James can access network 192.168.1/24 using TCP 8-, 443 and 8088

4
New cards

Many operating systems use ACL's to provide access to files

A trustee and the access rights allowed

5
New cards

Application allow/deny list

Any application can be dangerous

- Vulnerabilities, trojan horses, malware

Security policy can control app execution

- Allow list, deny/block list

Allow list

- Nothing runs unless it's approved

- Very restrictive

Deny list

- Nothing on the "bad list" can be executed

- Anti-virus, anti-malware

6
New cards

Examples of allow and deny lists

Decisions are made in the operating system

- Often built-in to the operating system management

Application hash

- Only allows applications with this unique identifier

Certificate

- Allow digitally signed apps from certain publishers

Explore top notes

note
Biological molecules (2.3-2.4)
Updated 1358d ago
0.0(0)
note
Chapter 14 - Mass Spectrometry
Updated 1288d ago
0.0(0)
note
VDI2
Updated 73d ago
0.0(0)
note
Frans ww. Tijden
Updated 1263d ago
0.0(0)
note
The Thirty Years' War (1618-1648)
Updated 702d ago
0.0(0)
note
Biological molecules (2.3-2.4)
Updated 1358d ago
0.0(0)
note
Chapter 14 - Mass Spectrometry
Updated 1288d ago
0.0(0)
note
VDI2
Updated 73d ago
0.0(0)
note
Frans ww. Tijden
Updated 1263d ago
0.0(0)
note
The Thirty Years' War (1618-1648)
Updated 702d ago
0.0(0)

Explore top flashcards

flashcards
LEXICO (7/9/2025)
85
Updated 206d ago
0.0(0)
flashcards
AP Gov Unit 1 Vocab
88
Updated 1211d ago
0.0(0)
flashcards
ap lit poetry terms
58
Updated 1178d ago
0.0(0)
flashcards
4.1 voc
113
Updated 686d ago
0.0(0)
flashcards
Vocab 3 + 4
30
Updated 908d ago
0.0(0)
flashcards
LEXICO (7/9/2025)
85
Updated 206d ago
0.0(0)
flashcards
AP Gov Unit 1 Vocab
88
Updated 1211d ago
0.0(0)
flashcards
ap lit poetry terms
58
Updated 1178d ago
0.0(0)
flashcards
4.1 voc
113
Updated 686d ago
0.0(0)
flashcards
Vocab 3 + 4
30
Updated 908d ago
0.0(0)