Podcast
Questions and Answers
What is the primary function of an IDS?
What is the primary function of an IDS?
Which of the following statements best describes a network-based IDS (NIDS)?
Which of the following statements best describes a network-based IDS (NIDS)?
How does a forward proxy function in relation to user IP addresses?
How does a forward proxy function in relation to user IP addresses?
What is one of the key differences between an IDS and an IPS?
What is one of the key differences between an IDS and an IPS?
Signup and view all the answers
What is a primary purpose of a reverse proxy?
What is a primary purpose of a reverse proxy?
Signup and view all the answers
In what way does a proxy server manage security?
In what way does a proxy server manage security?
Signup and view all the answers
Which type of IDS runs specifically on one computer to monitor that host?
Which type of IDS runs specifically on one computer to monitor that host?
Signup and view all the answers
What role does a NAT server play in relation to proxies?
What role does a NAT server play in relation to proxies?
Signup and view all the answers
What is the primary advantage of using DRaaS in disaster recovery planning?
What is the primary advantage of using DRaaS in disaster recovery planning?
Signup and view all the answers
Which UPS classification provides continuous power by switching to a battery only when an outage occurs?
Which UPS classification provides continuous power by switching to a battery only when an outage occurs?
Signup and view all the answers
What does the 3-2-1-1 rule emphasize regarding data backups?
What does the 3-2-1-1 rule emphasize regarding data backups?
Signup and view all the answers
What is the primary function of routers in a network?
What is the primary function of routers in a network?
Signup and view all the answers
Which of the following is true about BGP?
Which of the following is true about BGP?
Signup and view all the answers
Which routing protocol uses a distance-vector algorithm calculated by hop count to determine routes?
Which routing protocol uses a distance-vector algorithm calculated by hop count to determine routes?
Signup and view all the answers
What aspect does RTO (Recovery Time Objective) primarily define in disaster recovery planning?
What aspect does RTO (Recovery Time Objective) primarily define in disaster recovery planning?
Signup and view all the answers
What does OSPF utilize to map and determine the best path for data in a network?
What does OSPF utilize to map and determine the best path for data in a network?
Signup and view all the answers
Which statement is accurate regarding RAID 5 configurations?
Which statement is accurate regarding RAID 5 configurations?
Signup and view all the answers
What differentiates Online UPS from Standby UPS?
What differentiates Online UPS from Standby UPS?
Signup and view all the answers
What is the primary function of a packet-filtering firewall?
What is the primary function of a packet-filtering firewall?
Signup and view all the answers
Which feature is NOT typically found in a host-based firewall?
Which feature is NOT typically found in a host-based firewall?
Signup and view all the answers
Which type of firewall manages packets independently, without considering existing connections?
Which type of firewall manages packets independently, without considering existing connections?
Signup and view all the answers
What is the function of RADIUS in network security?
What is the function of RADIUS in network security?
Signup and view all the answers
Which of the following is NOT a characteristic of malware?
Which of the following is NOT a characteristic of malware?
Signup and view all the answers
What typically causes firewall failure?
What typically causes firewall failure?
Signup and view all the answers
Which of the following is the correct port number used by RADIUS for authentication?
Which of the following is the correct port number used by RADIUS for authentication?
Signup and view all the answers
What is NOT a category of disaster recovery contingency?
What is NOT a category of disaster recovery contingency?
Signup and view all the answers
Which DSL type provides equal download and upload speeds, maxing out around 2 Mbps?
Which DSL type provides equal download and upload speeds, maxing out around 2 Mbps?
Signup and view all the answers
Which characteristic describes a Trojan horse in malware?
Which characteristic describes a Trojan horse in malware?
Signup and view all the answers
Which modulation technique is used in DSL connections for optimal data transfer?
Which modulation technique is used in DSL connections for optimal data transfer?
Signup and view all the answers
Which SNMP version primarily enhances performance and security compared to its predecessor?
Which SNMP version primarily enhances performance and security compared to its predecessor?
Signup and view all the answers
Which of the following best describes stateful firewalls?
Which of the following best describes stateful firewalls?
Signup and view all the answers
What is the main purpose of a disaster recovery plan?
What is the main purpose of a disaster recovery plan?
Signup and view all the answers
Study Notes
Intrusion Detection and Prevention Systems (IDS/IPS)
- IDS (Intrusion Detection System) is a stand-alone device, application, or feature on a workstation, server, switch, router, or firewall.
- It monitors network traffic to detect suspicious activity.
- Two main detection methods: statistical anomaly detection and signature-based detection.
- Implementations include:
- HIDS (Host-based IDS): protects a single computer.
- NIDS (Network-based IDS): protects a network, usually at the edge or DMZ.
- IDS only detects and logs suspicious activity.
- IPS (Intrusion Prevention System) actively reacts to alerts by preventing malicious traffic, based on the source IP address.
- NIPS (Network-based Intrusion Prevention) protects entire networks.
- HIPS (Host-based Intrusion Prevention) protects individual hosts.
Proxy Servers
- Proxy server acts as an intermediary between internal and external networks, screening traffic.
- Manages security at the application layer.
- Appears as an internal server to the outside world, but is a filtering device.
- Prevents exposure of internal network addresses.
- Reverse proxy provides services to external clients from internal servers, protecting internal servers.
- Reverse proxies are useful for multiple web servers sharing a public IP address.
- Forward and Reverse Proxies act as NAT (Network Address Translation) servers.
- Forward proxy hides internal user IP addresses, while a reverse proxy responds to client requests for internal web servers.
Firewalls
- Firewall is a device or software that filters or blocks network traffic.
- Can be placed between private networks (e.g., internal LANs) and a public network (e.g., internet).
- Host-based firewalls only protect the computer they're installed on.
- Packet-filtering firewall examines packet headers against Access Control Lists (ACLs) to allow or deny traffic based on criteria like IP addresses, ports, and protocol types.
- Common criteria for filtering traffic: Source/destination IP addresses, Source/destination ports, TCP flags, UDP/ICMP protocols, packet sequence status, inbound/outbound status.
- Stateful firewalls monitor existing traffic streams, while stateless firewalls examine each packet independently.
- Firewall rules are similar to ACLs; ACL functions on a single interface.
- Common cause of firewall failure is misconfiguration (too lenient or too strict rules).
Remote Authentication Dial-In User Service (RADIUS)
- RADIUS is a cross-platform, open-source application layer protocol used for user authentication.
- Uses either UDP or TCP in the transport layer.
- Can run on a remote access server or a dedicated RADIUS server.
- Highly scalable, used for authenticating wireless, mobile, and remote users.
- Often combined with other network services (e.g., proxies, VPNs) on a single machine.
- Authentication port: 1812
- Standard port: 1813
DSL (Digital Subscriber Line)
- DSL is a WAN connection method using the PSTN.
- Supports multiple data and voice channels over a single line.
- Requires repeaters for longer distances.
- Distance to the central office (CO) affects throughput.
- Uses advanced data modulation techniques (amplitude/phase modulation).
- Faster than traditional dial-up modems.
- Digital carrier, unlike analog dial-up modems.
- xDSL refers to all DSL varieties (e.g., ADSL, VDSL, SDSL).
Simple Network Management Protocol (SNMP)
- SNMP is part of the TCP/IP suite.
- Three versions: SNMP v1-3.
- SNMPv1 is rarely used today.
- SNMPv2 improved on SNMPv1 with better performance and a slightly better security.
- SNMPv3 augments SNMPv2 with authentication, validation, and encryption.
Malware
- Malware is a program designed to intrude upon or harm a system or resources.
- Types of malware: Viruses, Trojans, Worms, Bots, Ransomware
- Virus: replicates itself to infect more computers
- Trojan: disguises itself as useful but harms the system
- Worm: runs independently and spreads between computers/networks
- Bot: automatically runs without user intervention
- Ransomware: locks user data or systems until a ransom is paid
Business Continuity and Disaster Recovery
- Business continuity is a company's ability to continue operations with minimal disruption.
- Disaster recovery plan details processes for restoring critical functionality and data.
- A disaster recovery plan should include contacts, backup frequency/location/methods/verification, network redundancy/agreements, strategies for testing, and crisis management.
- Three categories of disaster recovery contingencies: cold site, warm site, hot site.
- DRaaS (Disaster Recovery as a Service) is a cloud-based, scalable, inexpensive DR option.
- PDU (Power Distribution Unit) is attached to a power source.
- UPS (Uninterruptible Power Supply) is a battery-powered power source that prevents power fluctuations.
- UPS categories: Standby UPS and Online UPS.
- Backup is a copy of data or program files kept for archiving or safekeeping.
- 3-2-1-1 Rule: 3 copies of data, 2 media types, 1 copy offsite, 1 offline copy. Factors affecting contingency plans and backup options include RTO (recovery time objective) and RPO (recovery point objective).
Routers and Routing Protocols
- Router connects two or more networks and passes packets from one network to another.
- Router functions: connect dissimilar networks (LAN/WAN), interpret Layer 3 and often Layer 4 addressing, determine the best path, and reroute traffic if the primary path is down.
- Router categories: Core/Interior routers (within AS), Edge/Border routers (between AS's), Exterior routers (out of organization's AS).
- Routing protocols enable routers to communicate to find optimal paths.
- Interior Gateway Protocols (IGPs) are used within Autonomous Systems (AS's) (e.g., RIP, OSPF, IS-IS, EIGRP).
- Exterior Gateway Protocols (EGPs) facilitate routing outside of AS's (e.g., BGP).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the fundamentals of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), detailing their functions, types, and methods of detection. Additionally, it includes information about proxy servers and their role in network security. Test your knowledge on these critical components of network safety!