NETWORK SECURITY EXAM 1

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Network Security

consists of configurations and practices utilized to protect against & monitor unauthorized access/modifications of a network.

2
New cards

attack

any action that compromises the security of data on a system

3
New cards

threat

any action that could damage an asset

4
New cards

cybersecurity kill chain

5
New cards

attack surface

consists of the reachable & exploitable vulnerabilities on a system

6
New cards

firewall

acts as a gate between a network, allowing and denying network traffic based on its configurations

7
New cards

firewall goals…

  • All traffic, in and out, must pass through the firewall

  • Only authorized traffic (defined by firewall config) is allowed to pass

  • The firewall itself is immune to penetration

8
New cards

stateful

filters traffic based on trusted networks/IP addresses

9
New cards

stateless

filters traffic based on fixed rules and doesn’t remember any packet information

10
New cards

DMZ (Demilitarized Zone)

an isolated network zone that acts as a buffer between internal network and the internet

11
New cards

IDS

Passive system used to identify anomalous traffic on a network

12
New cards

IPS

Active system used to control anomalous network traffic

13
New cards

signature-based

relies on a se of pre-configured list of rules for known traffic patterns

14
New cards

anomaly-based

utilizes a model of normal patterns on the network, and alerts anomalous patterns

15
New cards

NGFW

enhanced functions of a traditional firewall, while additionally have IPS capabilities

16
New cards

UTM

17
New cards

App identification

18
New cards

User identification

19
New cards

Content identification

20
New cards

DNSSec

authentication & integrity verification of DNS recordss

21
New cards

Blacklist vs Whitelist…

  • Blacklist = (default; allow)

  • Whitelist = (default; deny)

22
New cards

Single Bastion T

23
New cards

Double Bastion T

24
New cards

DNS zone

a specific portion of the DNS that is mananaged by an administrator or set of name servers; contains all DNS records for domains

25
New cards

DNS domain

a name that serves as an address for a site or service on the internet

26
New cards

Buffer overflow

a cyberattack where an attacker sends an abundance of data to overwhelm a system

27
New cards

Session hijacking

a cyberattack where an attack steals a legitimate user’s session ID to gain unauthroized access

28
New cards

DNS-cache poisoning

a cyberattack taht causes a DNS resolver to return an false IP address by corrupting data in resolver’s cache

29
New cards

packet filtering

30
New cards

port hopping

31
New cards

out-of-band vs inline…

32
New cards

network security monitoring (NSM)

33
New cards

Continuous Monitoring (CM)

34
New cards

Firewall Rules Order: