Domain 3.2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

What are the key network design factors related to infrastructure considerations?

Factors include device placement, security zones, attack surface, connectivity, failure modes, and device attributes.

2
New cards

Which factor indicates where devices are located in a network?

Device placement.

3
New cards

What defines network segments with distinct security policies?

Security zones.

4
New cards

What is meant by the 'attack surface'?

Vulnerable points exposed to threats in a network.

5
New cards

What does connectivity refer to in network design?

Network connections between devices.

6
New cards

What are 'failure modes' in network devices?

How devices respond to failures.

7
New cards

What happens in a fail-open scenario?

The device allows traffic on failure.

8
New cards

Explain what is meant by fail-closed in network devices.

The device blocks traffic on failure.

9
New cards

What are device attributes?

Characteristics of network devices.

10
New cards

Define active vs. passive in the context of devices.

Active refers to devices that interact with traffic, while passive refers to devices that monitor without altering traffic.

11
New cards

Explain the difference between inline and tap/monitor.

Inline handles traffic directly, while tap/monitor retrieves copies of traffic for analysis.

12
New cards

What are network appliances?

Devices with specific functions within a network.

13
New cards

What is a jump server?

A secure access intermediary for connecting to internal networks.

14
New cards

What does a proxy server do?

Acts as an intermediary for client-server requests.

15
New cards

What are IPS and IDS?

Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) monitor and protect networks from threats.

16
New cards

What is the role of a load balancer?

Distributes network traffic evenly among multiple devices.

17
New cards

What are sensors in network security?

Devices that monitor network traffic for anomalies.

18
New cards

What is port security?

Protection of physical network ports from unauthorized access.

19
New cards

What does 802.1X refer to?

Port-based network access control protocol.

20
New cards

What is the Extensible Authentication Protocol (EAP)?

An authentication framework for various methods of network access.

21
New cards

What are the different types of firewalls?

Various categories of firewalls like packet filtering, stateful inspection, etc.

22
New cards

What is a Web Application Firewall (WAF)?

A firewall that protects web applications from specific attacks.

23
New cards

Define Unified Threat Management (UTM).

A comprehensive security solution that integrates multiple security features.

24
New cards

What features characterize a Next-Generation Firewall (NGFW)?

Advanced features including application awareness, integrated intrusion prevention.

25
New cards

What do Layer 4 and Layer 7 filtering refer to?

Filtering based on the OSI model layers: Layer 4 for transport and Layer 7 for application.

26
New cards

What is the purpose of secure communication/access?

To protect data in transit and ensure secure access to networks.

27
New cards

What is a Virtual Private Network (VPN)?

A service that provides secure remote access over the internet.

28
New cards

Define remote access in networking.

Connecting to a network from a remote location.

29
New cards

What is tunneling in networking?

A method for securing data transmission through a private tunnel.

30
New cards

What is Transport Layer Security (TLS)?

A cryptographic protocol providing secure communication over a computer network.

31
New cards

What does Internet Protocol Security (IPSec) do?

Secures Internet Protocol (IP) communications by authenticating and encrypting each IP packet.

32
New cards

What is a Software-Defined Wide Area Network (SD-WAN)?

A dynamic network management approach for wide area networks.

33
New cards

What is Secure Access Service Edge (SASE)?

A cloud-based network security model combining networking and security functions.

34
New cards

What does selection of effective controls refer to?

Choosing appropriate security measures to mitigate risks.