Section 13: Network Security Infrastructure Part 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Firewalls

serve as the security guards at the perimeter of a network

2
New cards

Firewalls often sit

in the network perimeter in between routers and the internet

3
New cards

Routers connect three networks together

  • Internet

  • Intranet

  • DMZ

4
New cards

DMZ 

contains systems that must accept direct external communications

5
New cards

Stateless Firewalls

evaluate each connection independently 

6
New cards

Stateful Inspection

tracks open connections (used by modern firewalls)

7
New cards

Firewall Rule Contents

set of rules firewall should act upon based on certain characteristics

8
New cards

Firewall Rule characteristics

  • Source System address

  • Destination system address

  • Destination port and protocol 

  • Action (Deny or Allow)

9
New cards

Implicit Deny (Default Deny)

if the firewall receives traffic not explicitly allowed by a firewall rule, then that traffic must be blocked. 

10
New cards

NGFWs incorporate

contextual info into their decision making

11
New cards

Other Firewall Roles

  • Content/URL filtering

  • Web Application

  • NAT Gateway

12
New cards

Firewall Deployment Options

  • Network hardware vs host-based software 

  • open-source vs proprietary

  • hardware appliance vs virtual appliance

13
New cards

VPN Endpoints

  • Firewalls

  • routers

  • servers

  • VPN concentrators

14
New cards

IP Security

provides secure transport, but difficult to configure and works at network layer 3 and supports layer 2 Tunneling Protocol

15
New cards

IPSec often used for static site-to-site VPN tunnels

True

16
New cards

SSL/TLS VPNs work at the application layer over TCP port 443

True

17
New cards

HTML5 VPNs work entirely within the web browser

True

18
New cards

Full Tunnel VPN

All network traffic leaving the connected device is routed through the VPN tunnel, regardless of its final destination

19
New cards

Split Tunnel VPN

only traffic destined for the corporate network is sent through the VPN tunnel. Other traffic is routed directly over is routed directly over the Internet.

20
New cards

Split-tunnel VPNs provide users with a false sense of security

True

21
New cards

Always-on VPN

all corpo mobile devices are configured to automatically connect to the VPN whenever they are powered on

22
New cards

Network Access Control (NAC)

intercepts network traffic coming from unknown devices and verifies that the system and the user are authorized before allowing further communication

23
New cards

NAC uses

802.1x authentication

24
New cards

Supplicant

responsible for performing all of the NAC related tasks on behalf of user and system

25
New cards

Authenticator

receives credentials from the end user

26
New cards

Authentication server

is a centralized server that performs authentication for all of the authenticators on the network. 

27
New cards

NAC roles

  • role-based access

  • user and device authentication

  • posture checking

28
New cards

Devices failing posture checks go

to quarantine VLAN

29
New cards

NAC can be implemented by

agent-based or agentless and Inline or out-of-band

30
New cards

Smart Devices

began with a desire for wireless network connectivity 

31
New cards

Smart devices require regular updates and you need to check for default passwords

true

32
New cards

Automatic updates

install w/o user’s knowledge or intervention

33
New cards

Manual Updates

requires that the user check and manually download installed updates

34
New cards

Firmware Version control

updates applied in an orderly fashion

35
New cards

Security Wrappers

vet requests for embedded systems

36
New cards

Smart devices require this to secure networks

Network Segmentation 

37
New cards

Network Segmentation

is the most important control for embedded devices

Explore top flashcards