Chapter 9: Implementing Secure Network Designs

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

7

DNS servers operate at layer __________ of the OSI model

128

IPv6 addresses are __________ bits

mutual authentication

Man in the middle attacks can be defeated using ____________________, where both hosts exchange secure credentials, but at layer two it is not always possible to put these controls in place

DHCP snooping

a configuration option that enables a switch to inspect DHCP traffic to prevent MAC spoofing by inspecting traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address

Open Shortest Path First (OSPF)

a link state routing protocol used on IP networks

subnetted

a single network divided into multiple logical broadcast domains is said to be ______________

segregation

a situation where hosts on one network segment are prevented from or restricted in communicating with hosts on other segments

route

a successful attack against ____________ security enables the attacker to redirect traffic from its intended destination

complex dependencies

a typical weakness for network designs is having ___________________, meaning services that require many different systems to be available

point of failure

a typical weakness of network designs is a single _________________ which is a pinch point that relies on a single hardware server or appliance or network channel

MAC flooding

a variation of an ARP poisoning attack where a switch's cache table is inudated with frames from random source MAC addresses

documentation, change control

a weakness in network designs is a lack of ____________________ and __________________, meaning network segments, appliances, and services might be added without proper change control procedures, leading to a lack of visibility into how the network is constituted

MAC cloning

an attack in which an attacker falsifies the factory assigned MAC address of a device's network interface

MAC filtering

applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it

Bridge Protocol Data Unit (BPDU)

are used to communicate information about the topology of a network and are not expected on access ports

east west traffic

design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out

load balancers

distribute traffic between network segments or servers to optimize performance, work at layer 4 of the OSI model or higher

Service Set Identifier (SSID)

A network name that wireless access points use to identify themselves.

DMZs

The hosts that provide the extranet or public access services should be placed in one or more ________________ which would typically include web servers, mail and other communication servers, proxy servers and remote access servers

flows

Understanding and controlling how data ______________ between systems is a key part of secure and effective network design

Network Access Control (NAC)

a general term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level

segment

a portion of a network where all attached hosts can communicate freely with one another

3

firewalls operate on layer _______ of the OSI model

screened host

smaller networks may not have the budget or technical expertise to implement a DMZ, so internet access can still be implemented using a dual homed proxy/gateway server acting as a _________________

network mapping

software that can scan a network and identify hosts, addresses, protocols, network interconnections, and so on

eavesdropping

some transmission media are susceptible to this, meaning listening in to communications sent over the media, to secure transmissions, they must be encrypted

triple homed

a DMZ cam be established using one router/firewall appliance with three network interfaces, referred to as ________________

access point

a device that provides a connection between wireless devices and can connect to wired networks

internet

a zone permitting anonymous access by untrusted hosts over the internet

extranet

a zone referring to a network of semi trusted hosts, typically representing business partners, suppliers, or customers, hosts must authenticate to join

intranet

a zone referring to a private network that is only accessible by the organizations own personnel

firewalls

apply an access control list to filter traffic passing in or out of a network segment

zone

in networking infrastructure, an area of a network where the security configuration is the same for all hosts within it

proxy

if communication is required between hosts on either side of a DMZ, a host within the DMZ acts as a _______________

2

layer ___________ network forwarding occurs between nodes on the same local network segement that are all in the same broadcast domain

3

layer ____________ network forwarding, or routing, occurs between both logically and physically defined networks

4

load balancers operate at layer ___________ of the OSI model

VLAN

logically separate network, created by using switching technology, even though two hosts on two of these may be physically connected to the same cabling, local traffic is isolated to each one so they must use a router to communicate

2

switches work at layer __________ of the OSI model

wireless controllers

a device that provides wireless LAN management for multiple APs so that each wireless access point does not need to be individually managed

routing protocols

allows a router to perform dynamic updates to its routing table based on route data exchanged with other routers

32

an IPv4 address is ____________ bits

2

wireless access points operate at layer _________ of the OSI model

fat, thin

An access point whose firmware contains enough processing logic to be able to function autonomously and handle clients without the use of a wireless controller is known as a __________ WAP, while one that requires a wireless controller in order to function is known as a ___________ WAP

STP

Layer 2 loops are prevented by _________________ by dynamically disabling links as needed

secret

Most dynamic routing protocols support message authentication via a shared ___________ configured on each device, preventing route table poisoning

Routing Information Protocol (RIP)

a distance vector based routing protocol that uses a hop count to determine the distance to the destination netwrok

Enhanced Interior Gateway Routing Protocol (EIGRP)

a distance vector based routing protocol using a metric composed of several administrator weighted elements including reliability, bandiwdth, delay, and load

screened host

a dual homed proxy/gateway server used to provide internet access to other network nodes, while protecting them from external attack

man in the middle attack

a form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently, also referred to as an on path attack

packet crafting

a method of manually generating packets (instead of modifying existing network traffic) to test the behavior of network devices, enabling a hacker to enumerate firewall or intrusion detection rules that are in place

ARP poisoning

a network based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient, this can be used to perform a variety of attacks, including DoS, spoofing, and MITM

router

a network device that links dissimilar networks and can support multiple alternate paths between location based parameters such as speed, traffic loads, and price, can apply logical IP subnet addresses to segments within a network

border gateway protocol

a path vector routing protocol used by IPSs to establish routing between one another

microsegmentation

a security process that is capable of applying policies to a single node, as though it was in a zone of its own

DMZ

a segment isolated from the rest of a private network by one or more firewalls that accepts connections from the internet over designated ports

bastion host

a server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise

perimeter security

a weakness in network design is an overdependence on _______________________, meaning if the network architecture is flat, penetrating the network edge gives the attacker freedom of movement

2

at layer __________, a broadcast domain is either all the nodes connected to the same physical unmanaged switch, or all the nodes within a VLAN

man in the middle

attackers can take advantage of the lack of security in low level data link protocols to perform _______________________ attacks

VLANs

because enterprise networks typically feature hundreds of switching appliances and network ports, segmentation is more likely to be enforced using ______________

DNS servers

host name records and perform name resolution to allow applications and users to address hosts and services using fully qualified domain names rather than IP addresses

IPv4

hosts should be allocated IPv6 addresses that map to the same zones as the _____________ topology

3

the network layer is layer __________ of the OSI model and includes routers, IP addresses, subnets, and the internet protocol

1, 2

Attacks at the physical and data link layers, referred to in the OSI model as layer _______ or layer __________, are often focused on information gathering

intranet, extranet, internet

There are three main zones in network topology:

port-based network access control (PNAC)

A switch or router that performs some sort of authentication of the attached device before activating the port, using an AAA server to authenticate the attached device before activating the port

3

routers operate on layer ________ of the OSI model

route table poisoning

Routing protocols that have no or weak authentication are vulnerable to ____________________ meaning that traffic is misdirected to a monitoring port (sniffing), sent to a blackhole, or continuously looped around the network, causing DoS

broadcast storms

STP is principally designed to prevent _________________, which is traffic that is recirculated and amplified by loops in a switching topology, causing network slowdowns and crashing switches

MAC cloning

While a unique MAC address is assigned to each network interface by the vendor at the factory, it is possible to complete __________________ in software via OS commands, alterations to the network driver configuration, or using packet crafting software

2.4, 5

Wireless networks can operate in either the ______________ GHz band or the ______________ GHz band

ARP

_____________ maps a network interface's hardware address to an IP address

network access control

______________________ products allow administrators to devise policies or profiles describing a min security configuration that devices must meet to be granted network access, this is called a health policy

screened

a ______________ subnet uses two firewalls placed on either side of the DMZ

site survey

a collection of information about a location for the purposes of building an ideal infrastructure; it often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and identifying sources of interference

availability

a common weakness in network designs is prioritizing _________________ over confidentiality and integrity, to take shortcuts to get a service up and running

choke

in a screened subnet, the ______________ firewall is internal and filters communications between hosts in the DMZ and hosts on the LAN

edge

in a screened subnet, the ______________ firewall restricts traffic on the external/public interface and allows permitted traffic to the hosts in the DMZ, it can be referred to as a screening firewall or router

heat map

in a wifi site survey, a diagram showing signal strength at different locations, shows red for strong signal, and green/blue for weak signal, and which channel is being used and how they overlap

switch

in ethernet, a networking device that receives incoming data, reviews the destination MAC address against an internal address table, and sends the data out through the port that contains the destination MAC address

routing table

information about how to reach individual networks within an internetwork is processed by routers, which store the data in a __________________

DMZ

internet facing hosts are placed inside one or more _______________

security

it is quite likely that more than one DMZ will be required as the services that run in them may have different _____________ requirements

2

the data link layer is layer _________ of the OSI model and includes switches, access points, mac addresses and VLANs

port security

preventing a device attacked to a switch port from communicating on the network unless it matches a given MAC address or other protection profile

wireless access points

provide a bridge between a cabled network and wireless clients or stations, operate at layer 2 of the OSI model

zero trust

security design paradigm where any request (host to host or container to container) must be authenticated before being allowed

Wi-Fi Protected Access (WPA)

standards for authenticating and encrypting access to wifi networks, designed to fix critical vulnerabilities in WEP

BPDU guard

switch port security feature that disables the port if it receives BPDU notifications related to spanning tree, this is configured on access ports where there are any BPDU frames are likely to be malicious

7

the application layer is layer ___________ of the OSI model and includes fully qualified domain names, and protocols such as HTTP, SMTP, RTP, FTP, and DNS

DMZ

the basic principle of a _____________ is that traffic cannot pass directly through it, it enables external clients to access data on private systems without compromising the security of the network as a whole

ARP

the broadcast mechanism by which individual hardware MAC addresses are matched to an IP address on a local network segment

posture assessment

the process for verifying compliance with a health policy by using host health checks

MAC address table

the table on a switch keeping track of MAC addresses associated with each port, as the switch uses a type of memory called content addressable memory, this is sometimes called the CAM table

4

the transport layer is layer _________ of the OSI model and includes load balancers, firewalls, TCP, UDP

default gateway

the usual target of an ARP poisoning attack is the ___________________, meaning if successful, all traffic destined for remote networks will be sent to the attacker

source routing

this uses an option in the IP header to predetermine the route a packet will take through the network or waypoints that is must pass through, this can be used to maliciously spoof the IP addresses and bypass router/firewall filters

internal, external

to configure a DMZ, two different security configurations must be enabled, one on the _____________ interface and one on the ______________ interface

north south

traffic that goes to and from a data center is referred to as _________________ and represents clients outside the data center making requests and receiving responses


संबंधित स्टडी सेट्स

IC3 Key Applications Lesson 7 - 9

View Set

LESSON 3 what's your name ? /第三课 你叫什么名字

View Set

Series 7: Variable Annuities (UITs)

View Set

Chapter 7-ENTR-202-Small Business Strategies: Imitation with a Twist

View Set

Introduction to Linux (Questions)

View Set

Chapter 2 - Hardware and Software

View Set

Nclex Review: Joint Replacement Surgery, Amputation

View Set

AP Human Geography Review - Unit Five

View Set

Econ 2000 Practice Tests 1 and 2

View Set