Looks like no one added any tags here yet for you.
What are the key network design factors related to infrastructure considerations?
Factors include device placement, security zones, attack surface, connectivity, failure modes, and device attributes.
Which factor indicates where devices are located in a network?
Device placement.
What defines network segments with distinct security policies?
Security zones.
What is meant by the 'attack surface'?
Vulnerable points exposed to threats in a network.
What does connectivity refer to in network design?
Network connections between devices.
What are 'failure modes' in network devices?
How devices respond to failures.
What happens in a fail-open scenario?
The device allows traffic on failure.
Explain what is meant by fail-closed in network devices.
The device blocks traffic on failure.
What are device attributes?
Characteristics of network devices.
Define active vs. passive in the context of devices.
Active refers to devices that interact with traffic, while passive refers to devices that monitor without altering traffic.
Explain the difference between inline and tap/monitor.
Inline handles traffic directly, while tap/monitor retrieves copies of traffic for analysis.
What are network appliances?
Devices with specific functions within a network.
What is a jump server?
A secure access intermediary for connecting to internal networks.
What does a proxy server do?
Acts as an intermediary for client-server requests.
What are IPS and IDS?
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) monitor and protect networks from threats.
What is the role of a load balancer?
Distributes network traffic evenly among multiple devices.
What are sensors in network security?
Devices that monitor network traffic for anomalies.
What is port security?
Protection of physical network ports from unauthorized access.
What does 802.1X refer to?
Port-based network access control protocol.
What is the Extensible Authentication Protocol (EAP)?
An authentication framework for various methods of network access.
What are the different types of firewalls?
Various categories of firewalls like packet filtering, stateful inspection, etc.
What is a Web Application Firewall (WAF)?
A firewall that protects web applications from specific attacks.
Define Unified Threat Management (UTM).
A comprehensive security solution that integrates multiple security features.
What features characterize a Next-Generation Firewall (NGFW)?
Advanced features including application awareness, integrated intrusion prevention.
What do Layer 4 and Layer 7 filtering refer to?
Filtering based on the OSI model layers: Layer 4 for transport and Layer 7 for application.
What is the purpose of secure communication/access?
To protect data in transit and ensure secure access to networks.
What is a Virtual Private Network (VPN)?
A service that provides secure remote access over the internet.
Define remote access in networking.
Connecting to a network from a remote location.
What is tunneling in networking?
A method for securing data transmission through a private tunnel.
What is Transport Layer Security (TLS)?
A cryptographic protocol providing secure communication over a computer network.
What does Internet Protocol Security (IPSec) do?
Secures Internet Protocol (IP) communications by authenticating and encrypting each IP packet.
What is a Software-Defined Wide Area Network (SD-WAN)?
A dynamic network management approach for wide area networks.
What is Secure Access Service Edge (SASE)?
A cloud-based network security model combining networking and security functions.
What does selection of effective controls refer to?
Choosing appropriate security measures to mitigate risks.