Security Rules - CompTIA Network+ N10-009 - 4.3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:32 AM on 3/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

6 Terms

1
New cards

Access Control List

Allow or disallow traffic

- Groupings of categories

- Source IP, destination IP, port number, time of day, applciation, etc

Restrict access to network devices

- Limit by IP address or other identifier

- Prevent regular user / non-admin access

Can be implemented in many ways

- Router, firewall, operating system policies, etc

2
New cards

Firewalls security policies

A logical path

Can be specific or gebneral

Implicit deny

- Most firewalls include a deny at the bottom, even if you didn't put one

<p>A logical path</p><p>Can be specific or gebneral</p><p>Implicit deny</p><p>- Most firewalls include a deny at the bottom, even if you didn't put one</p>
3
New cards

URL filtering

Allow or restrict based on URL

- Also called a Uniform Resource Identifier (URI)

- Allow list / block list

Managed by category

- Auction, hacking, malware, travel, recreation, etc

Often integrated in NGFW

4
New cards

Content FIltering

Control traffic based on data within the content

-Data in the packets

Corporate control of outbound and inbound data

-Sensitive materials

Control of inappropriate content

-Not safe for work

-Parental controls

Protection against evil

-Anti-virus, anti-malware

5
New cards

Screened subnet

• An additional layer of security between the you and

the Internet

- Public access to public resources

- Private data remains inaccessible

<p>• An additional layer of security between the you and</p><p>the Internet</p><p>- Public access to public resources</p><p>- Private data remains inaccessible</p>
6
New cards

Security Zones

Zone-based security technologies

-More flexible (and secure) than IP address ranges

Each area of the network is associated with a zone

-Trusted, untrusted

-Internal, external

-Inside, Internet, Servers, Databases, Screened

This simplifies security policies

-Trusted to Untrusted

-Untrusted to Screened

-Untrusted to Trusted

<p>Zone-based security technologies</p><p>-More flexible (and secure) than IP address ranges</p><p>Each area of the network is associated with a zone</p><p>-Trusted, untrusted</p><p>-Internal, external</p><p>-Inside, Internet, Servers, Databases, Screened</p><p>This simplifies security policies</p><p>-Trusted to Untrusted</p><p>-Untrusted to Screened</p><p>-Untrusted to Trusted</p>

Explore top flashcards

flashcards
Civics Final Essay Study Guide
23
Updated 178d ago
0.0(0)
flashcards
2nd Semester Vocab List #1
40
Updated 1121d ago
0.0(0)
flashcards
MH Exam
83
Updated 829d ago
0.0(0)
flashcards
13 Colonies Test Prep 2025
41
Updated 89d ago
0.0(0)
flashcards
La identidad
38
Updated 176d ago
0.0(0)
flashcards
Civics Final Essay Study Guide
23
Updated 178d ago
0.0(0)
flashcards
2nd Semester Vocab List #1
40
Updated 1121d ago
0.0(0)
flashcards
MH Exam
83
Updated 829d ago
0.0(0)
flashcards
13 Colonies Test Prep 2025
41
Updated 89d ago
0.0(0)
flashcards
La identidad
38
Updated 176d ago
0.0(0)