Security Technologies

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Security Technologies

1 / 159

flashcard set

Earn XP

Description and Tags

CompTIA+ Network Learning

160 Terms

1

Security Technologies

Various technologies used to ensure network security, including firewalls, intrusion detection and prevention systems, remote access, virtual private networks, IPsec, and network logging and monitoring.

New cards
2

Domain one

networking fundamentals:The first domain in the course, covering the basics of networking.

New cards
3

Domain two

network implementations:The second domain in the course, focusing on the implementation of network devices and features.

New cards
4

Domain three

network operations:The third domain in the course, covering network operations and management.

New cards
5

Domain four

network security:The fourth domain in the course, focusing on network security concepts and practices.

New cards
6

Objective 1.5

Explaining common ports and protocols, their application, and encrypted alternatives.

New cards
7

Objective 2.1

Comparing and contrasting various network devices, their features, and appropriate placements on the network.

New cards
8

Objective 3.1

Using appropriate statistics and sensors to ensure network availability.

New cards
9

Objective 4.1

Explaining common security concepts.

New cards
10

Objective 4.3

Applying network hardening techniques.

New cards
11

Objective 4.4

Comparing and contrasting remote access methods and security implications.

New cards
12

Firewall

A network security device that uses a set of rules to permit or deny traffic based on defined criteria, acting as a barrier to protect networks.

New cards
13

Packet-filtering firewall

A type of firewall that permits or denies traffic based on packet headers, specifically source and destination IP addresses and ports.

New cards
14

Stateful firewall

A type of firewall that inspects traffic as part of a session and only allows replies to requests made within that session.

New cards
15

Next-generation firewall (NGFW)

A third-generation firewall that conducts deep packet inspection and operates at layers five, six, and seven of the OSI model.

New cards
16

Access Control List (ACL)

A set of rules assigned to a router interface or firewall that permit or deny traffic based on IP address, MAC address, or port.

New cards
17

Firewall zones

Classifications of firewall interfaces into inside, outside, and DMZ zones, allowing for the creation of rules specific to each zone.

New cards
18

Intranet

A local area network that connects devices within an organization.

New cards
19

Internet

The global network of networks that allows communication between devices and networks worldwide.

New cards
20

DMZ (Demilitarized Zone)

A zone that connects devices with restricted access from the outside, such as web servers and email servers, to the internal network.

New cards
21

Stateful Firewall

A firewall that allows traffic from the internet to the internal network only if it has been requested by an internal device.

New cards
22

UTM (Unified Threat Management)

A device that combines multiple security functions, such as firewall, router, intrusion detection and prevention, and antimalware, into a single device.

New cards
23

NAC (Network Access Control)

A function of the UTM that authenticates and authorizes new devices before allowing them onto the network.

New cards
24

Border Device

A device placed at the network boundary that provides security functions such as firewall and routing.

New cards
25

Outbound Connection

A connection initiated from devices within the network to external devices or networks.

New cards
26

Inbound Connection

A connection initiated from external devices or networks to devices within the network.

New cards
27

Windows Firewall

The built-in firewall in the Windows operating system that allows users to configure inbound and outbound rules for network traffic.

New cards
28

Mac Firewall

The built-in firewall in macOS that allows users to configure inbound and outbound rules for network traffic.

New cards
29

Secure Shell (SSH)

A cryptographic network protocol that allows secure remote access and control of devices over an unsecured network.

New cards
30

Firewall

A security measure that controls the incoming and outgoing network traffic based on predetermined rules.

New cards
31

Allow Action

A setting that permits a program or connection to pass through the firewall.

New cards
32

Any/Any Rule

A rule that allows any program, protocol, and port to pass through the firewall, potentially compromising security.

New cards
33

Port

A numerical identifier that specifies a particular process or service on a device.

New cards
34

Web Server

A program or computer that serves web pages to clients upon request.

New cards
35

TCP Traffic

Transmission Control Protocol (TCP) is a protocol that ensures reliable, ordered, and error-checked delivery of data packets over a network.

New cards
36

UDP Traffic

User Datagram Protocol (UDP) is a protocol that allows for the transmission of datagrams over an IP network without the need for a connection.

New cards
37

VPN Tunnel

A secure, encrypted connection between two networks or devices over a public network, such as the internet.

New cards
38

Block

A setting that prohibits a program or connection from passing through the firewall.

New cards
39

Telnet

A network protocol that allows for remote login and control of a device over a network, often considered insecure.

New cards
40

Monitoring

A feature that allows users to view and analyze network activity, log files, and active firewall rules.

New cards
41

IDS

Intrusion Detection System, a passive security device that monitors network traffic and alerts the administrator of potential attacks.

New cards
42

IPS

Intrusion Prevention System, an active security device that monitors and blocks network traffic to prevent attacks in real-time.

New cards
43

Snort

A widely used open-source software-based IDS/IPS that detects and responds to network attacks.

New cards
44

Signature-based Detection

A method of detecting attacks based on predefined patterns or signatures.

New cards
45

Policy-based Detection

A method of detecting attacks based on predefined security policies or rules.

New cards
46

Anomaly-based Detection

A method of detecting attacks based on deviations from normal network behavior or statistical patterns.

New cards
47

Non-statistical anomaly

An anomaly that is based on a pattern or baseline defined by the administrator.

New cards
48

Network-based IDS

An intrusion detection system that is a network device designed to protect the entire network.

New cards
49

Host-based IDS

An intrusion detection system that is installed as software on a host or server.

New cards
50

Network-based IPS

An intrusion prevention system that is a network device designed to protect the entire network.

New cards
51

Host-based IPS

An intrusion prevention system that is installed as software on a host or server.

New cards
52

In-line protection

Using a network-based IPS to protect against denial of service attacks.

New cards
53

Software-based protection

Using host-based IPS to prevent unauthorized software installation and running.

New cards
54

Remote access

Various methods to access a server or network device remotely over a network.

New cards
55

Telnet

A text-based remote access technology that operates on port 23.

New cards
56

SSH

Secure Shell, a text-based remote access technology that encrypts the connection and operates on port 22.

New cards
57

RDP

Remote Desktop Protocol, a proprietary protocol developed by Microsoft for graphical interface remote access to computers over a network.

New cards
58

RDG

Remote Desktop Gateway, a Windows server that creates a secure connection using SSL or TLS protocols for RDP sessions.

New cards
59

VPN

Virtual Private Network, used to establish a secure connection between a client and a server over an untrusted public network.

New cards
60

VNC

Virtual Network Computing, a cross-platform remote access technology that operates on port 5900.

New cards
61

VDI

Virtual Desktop Infrastructure, a form of desktop virtualization that hosts a desktop environment on a centralized server.

New cards
62

In-band management

Managing devices through the use of Telnet or SSH protocols over the network.

New cards
63

Out-of-band management

Managing devices through an alternate path or management network separate from the production network.

New cards
64

Authentication

The process of confirming a user's identity.

New cards
65

Authorization

Granting the user the proper permissions to access a specific resource on the network.

New cards
66

PAP (Password Authentication Protocol)

An insecure authentication protocol that sends usernames and passwords in clear text over the network.

New cards
67

CHAP (Challenge Handshake Authentication Protocol)

An improvement over PAP that encrypts credentials and uses a challenge-response mechanism for authentication.

New cards
68

MS-CHAP (Microsoft Challenge Handshake Authentication Protocol)

Similar to CHAP but developed by Microsoft.

New cards
69

EAP (Extensible Authentication Protocol)

A more secure authentication protocol that allows for various methods of authentication, such as smart cards and digital certificates.

New cards
70

VPN (Virtual Private Network)

A network that extends a private network across a public network, enabling users to send and receive data as if they were directly connected to the private network.

New cards
71

Site-to-site VPN

A VPN configuration used to connect two offices together.

New cards
72

Client-to-site VPN

A VPN configuration used to connect a single remote user to a corporate network.

New cards
73

Clientless VPN

A VPN configuration used for web browsing without requiring a client software.

New cards
74

Full tunnel VPN

A VPN configuration that routes and encrypts all traffic requests through the VPN connection to the headquarters, regardless of the destination.

New cards
75

Split tunnel VPN

A VPN configuration that allows certain traffic to be routed through the VPN connection while other traffic can access local resources directly.

New cards
76

Split tunnel VPN

A type of VPN configuration that divides network traffic, routing some traffic over the VPN while sending other traffic directly to the internet.

New cards
77

Encrypted VPN tunnel

A secure pathway created by a VPN that encrypts data packets and sends them over the network.

New cards
78

Full tunnel VPN

A VPN configuration that routes all network traffic, including internet traffic, through the VPN.

New cards
79

Clientless VPN

A type of VPN that allows secure remote access using a web browser without the need for additional software or hardware clients.

New cards
80

SSL (Secure Socket Layer)

A protocol that provides cryptography and reliability for secure web browsing over HTTPS.

New cards
81

TLS (Transport Layer Security)

A protocol that has replaced SSL for secure web browsing over HTTPS, providing improved security.

New cards
82

IPsec (IP Security)

A secure network protocol suite used for authentication and encryption of data packets in VPNs to create a secure communication path.

New cards
83

Confidentiality

A feature provided by IPSec that ensures data encryption to protect sensitive information from unauthorized access.

New cards
84

Integrity

A feature provided by IPSec that ensures data integrity by verifying that data has not been modified during transmission.

New cards
85

Authentication

A feature provided by IPSec that verifies the identities of the communicating parties to prevent unauthorized access.

New cards
86

Anti-replay

A feature provided by IPSec that prevents the transmission of duplicate packets and protects against packet capture and resend attacks.

New cards
87

IKE Phase 1

The initial phase of IPSec where the identities of the IPSec peers are authenticated and a secure channel for negotiation is established.

New cards
88

IKE Phase 2

The phase of IPSec where the security association parameters are negotiated, and the secure tunnel is fully established.

New cards
89

Data transfer

The phase of IPSec where data is transferred between the IPSec peers over the secure tunnel using the negotiated IPSec parameters and keys.

New cards
90

IPSec tunnel termination

The phase of IPSec where the security associations are terminated, either through mutual agreement or due to non-responsiveness of one party.

New cards
91

ISAKMP

An acronym for Internet Security Association and Key Management Protocol, which is used for exchanging security associations between IPSec peers.

New cards
92

Security Associations

Contains authentication methods, encryption and hash algorithms, Diffie-Hellman groups, expiration of the IKE SA, and shared secret values for encryption algorithms. These are used by IPSec peers to make and maintain their IPSec tunnels.

New cards
93

Aggressive Mode

A mode in ISAKMP with fewer exchanges than the main mode, resulting in faster initial connection and fewer packets exchanged.

New cards
94

Diffie-Hellman

A key exchange algorithm that allows two systems to exchange a secret key and trust each other without knowing each other beforehand.

New cards
95

IKE Phase Two

The phase of IKE that negotiates IPSec security associations to set up the IPSec tunnel.

New cards
96

Quick Mode

A mode used in IKE Phase Two to negotiate a shared IPSec policy, drive shared secret key materials, and establish IPSec Security Associations.

New cards
97

IPSec Security Associations (SAs)

Established during IKE Phase Two, these SAs are used for encrypting and decrypting packets in the IPSec tunnel, ensuring confidentiality and security.

New cards
98

Data Transfer

The process of securely transmitting data over the established IPSec tunnels using IPSec SAs.

New cards
99

Termination of Tunnel

The process of ending the IPSec tunnel by deleting the IPSec SAs either by mutual agreement or when they reach their lifetime expiration.

New cards
100

Diffie-Hellman Key Exchange

A method used in IKE Phase One to establish a shared secret key between two systems using their private and public keys generated through the Diffie-Hellman protocol.

New cards

Explore top notes

note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 57 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1418 people
Updated ... ago
4.8 Stars(25)

Explore top flashcards

flashcards Flashcard29 terms
studied byStudied by 297 people
Updated ... ago
4.5 Stars(10)
flashcards Flashcard50 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard80 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard144 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard47 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 82 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard146 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)