Domain 3.2

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 33

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

34 Terms

1

What are the key network design factors related to infrastructure considerations?

Factors include device placement, security zones, attack surface, connectivity, failure modes, and device attributes.

New cards
2

Which factor indicates where devices are located in a network?

Device placement.

New cards
3

What defines network segments with distinct security policies?

Security zones.

New cards
4

What is meant by the 'attack surface'?

Vulnerable points exposed to threats in a network.

New cards
5

What does connectivity refer to in network design?

Network connections between devices.

New cards
6

What are 'failure modes' in network devices?

How devices respond to failures.

New cards
7

What happens in a fail-open scenario?

The device allows traffic on failure.

New cards
8

Explain what is meant by fail-closed in network devices.

The device blocks traffic on failure.

New cards
9

What are device attributes?

Characteristics of network devices.

New cards
10

Define active vs. passive in the context of devices.

Active refers to devices that interact with traffic, while passive refers to devices that monitor without altering traffic.

New cards
11

Explain the difference between inline and tap/monitor.

Inline handles traffic directly, while tap/monitor retrieves copies of traffic for analysis.

New cards
12

What are network appliances?

Devices with specific functions within a network.

New cards
13

What is a jump server?

A secure access intermediary for connecting to internal networks.

New cards
14

What does a proxy server do?

Acts as an intermediary for client-server requests.

New cards
15

What are IPS and IDS?

Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) monitor and protect networks from threats.

New cards
16

What is the role of a load balancer?

Distributes network traffic evenly among multiple devices.

New cards
17

What are sensors in network security?

Devices that monitor network traffic for anomalies.

New cards
18

What is port security?

Protection of physical network ports from unauthorized access.

New cards
19

What does 802.1X refer to?

Port-based network access control protocol.

New cards
20

What is the Extensible Authentication Protocol (EAP)?

An authentication framework for various methods of network access.

New cards
21

What are the different types of firewalls?

Various categories of firewalls like packet filtering, stateful inspection, etc.

New cards
22

What is a Web Application Firewall (WAF)?

A firewall that protects web applications from specific attacks.

New cards
23

Define Unified Threat Management (UTM).

A comprehensive security solution that integrates multiple security features.

New cards
24

What features characterize a Next-Generation Firewall (NGFW)?

Advanced features including application awareness, integrated intrusion prevention.

New cards
25

What do Layer 4 and Layer 7 filtering refer to?

Filtering based on the OSI model layers: Layer 4 for transport and Layer 7 for application.

New cards
26

What is the purpose of secure communication/access?

To protect data in transit and ensure secure access to networks.

New cards
27

What is a Virtual Private Network (VPN)?

A service that provides secure remote access over the internet.

New cards
28

Define remote access in networking.

Connecting to a network from a remote location.

New cards
29

What is tunneling in networking?

A method for securing data transmission through a private tunnel.

New cards
30

What is Transport Layer Security (TLS)?

A cryptographic protocol providing secure communication over a computer network.

New cards
31

What does Internet Protocol Security (IPSec) do?

Secures Internet Protocol (IP) communications by authenticating and encrypting each IP packet.

New cards
32

What is a Software-Defined Wide Area Network (SD-WAN)?

A dynamic network management approach for wide area networks.

New cards
33

What is Secure Access Service Edge (SASE)?

A cloud-based network security model combining networking and security functions.

New cards
34

What does selection of effective controls refer to?

Choosing appropriate security measures to mitigate risks.

New cards

Explore top notes

note Note
studied byStudied by 39 people
863 days ago
4.0(1)
note Note
studied byStudied by 6 people
609 days ago
5.0(1)
note Note
studied byStudied by 12 people
896 days ago
4.0(1)
note Note
studied byStudied by 5 people
898 days ago
5.0(1)
note Note
studied byStudied by 25 people
965 days ago
4.5(2)
note Note
studied byStudied by 12 people
1035 days ago
5.0(1)
note Note
studied byStudied by 7 people
29 days ago
5.0(1)
note Note
studied byStudied by 139 people
66 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (37)
studied byStudied by 3 people
777 days ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 5 people
750 days ago
5.0(1)
flashcards Flashcard (67)
studied byStudied by 1 person
664 days ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 4 people
378 days ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 6 people
663 days ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 5 people
90 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 6 people
757 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 13 people
481 days ago
5.0(1)
robot