Network Segmentation and Security
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a firewall in a network?

  • To block all incoming traffic
  • To inspect and filter network traffic
  • To control the flow of traffic into and out of a network (correct)
  • To segment a network into smaller subnets
  • What is a choke point in a network?

  • A subnet with restricted access
  • A point where network traffic is inspected and controlled (correct)
  • A router that connects multiple subnets
  • A firewall that filters incoming traffic
  • What is a personal firewall?

  • A hardware device that filters network traffic
  • A security policy that blocks all incoming traffic
  • A software that controls network traffic to and from a computer (correct)
  • A network layer that encrypts data
  • Which of the following is an example of a firewall?

    <p>A Checkpoint firewall that allows or disallows traffic based on protocol</p> Signup and view all the answers

    What is the purpose of segmenting a network?

    <p>To reduce network security risks</p> Signup and view all the answers

    What is a common function of a firewall?

    <p>To allow or disallow traffic based on protocol</p> Signup and view all the answers

    What is the primary advantage of using WPA2?

    <p>It offers the strongest inherent security.</p> Signup and view all the answers

    Which of the following is a type of firewall?

    <p>Application proxy</p> Signup and view all the answers

    What is the main difference between a firewall and a personal firewall?

    <p>A firewall is used for networks, while a personal firewall is used for personal computers</p> Signup and view all the answers

    What is the primary function of FTP?

    <p>Transferring files insecurely.</p> Signup and view all the answers

    What is the secure equivalent of Telnet?

    <p>Secure Shell (SSH)</p> Signup and view all the answers

    What is the purpose of a honeypot?

    <p>To detect, monitor, and sometimes tamper with the activities of an attacker.</p> Signup and view all the answers

    What is the name of the tool used for port scanning?

    <p>Nmap</p> Signup and view all the answers

    What is the name of the tool used for firewall tools?

    <p>Hping3</p> Signup and view all the answers

    What is the main advantage of using security tools?

    <p>They are used by authorized users.</p> Signup and view all the answers

    What is the term used to describe new or unpublished attacks or vulnerabilities?

    <p>Zero-day attacks</p> Signup and view all the answers

    What is a DMZ typically a combination of?

    <p>A network design feature and a firewall</p> Signup and view all the answers

    Why do we need to ensure the security of devices such as mail servers and web servers?

    <p>Because they are exposed to external networks such as the Internet in order to function</p> Signup and view all the answers

    What is the purpose of putting a layer of protection between the device and the Internet, and between the rest of the network and the device?

    <p>To ensure the security of the device and the network behind it</p> Signup and view all the answers

    What do IDSes monitor for?

    <p>Unauthorized activity</p> Signup and view all the answers

    What type of IDS monitors the network traffic?

    <p>Network-based intrusion detection system (NIDS)</p> Signup and view all the answers

    What is the method of detection used by Signature-based IDSes?

    <p>Maintaining a database of attack signatures</p> Signup and view all the answers

    What is the method of detection used by Anomaly-based IDSes?

    <p>Maintaining a baseline of normal traffic and measuring against it</p> Signup and view all the answers

    How do Signature-based IDSes work?

    <p>By comparing incoming traffic to a database of attack signatures</p> Signup and view all the answers

    Study Notes

    Network Security

    • A properly laid out network can prevent some attacks, mitigate others, and fail in a graceful way when necessary.
    • Network segmentation can reduce the impact of attacks by dividing a network into smaller subnets, controlling traffic flow between them, and blocking traffic when necessary.

    Choke Points

    • Choke points are points in the network where traffic is funneled through to inspect, filter, and control traffic.
    • Examples of choke points include routers, firewalls, proxies, and application proxies.

    Firewalls

    • A firewall is a mechanism for controlling traffic that flows into and out of a network.
    • Firewalls can allow or disallow traffic based on protocol, allowing Web and e-mail traffic to pass while blocking everything else.

    Personal Firewall

    • A personal firewall is a lightweight software that controls network traffic to and from a computer, permitting or denying communications based on a security policy.
    • Personal firewalls typically work as an application-layer firewall and only protect the computer on which they are installed.

    DMZs

    • A DMZ (demilitarized zone) is a combination of a network design feature and a protective device, such as a firewall.
    • DMZs are used to protect devices that need to be exposed to external networks, such as mail servers, proxy servers, and Web servers.

    Network Intrusion Detection Systems

    • IDSes monitor networks, hosts, or applications for unauthorized activity.
    • There are three types of IDSes: Host-based intrusion detection systems (HIDSes), Application protocol-based intrusion detection systems (APIDSes), and Network-based intrusion detection systems (NIDSes).

    IDS Detection Methods

    • IDSes are classified into two main categories: signature-based detection and anomaly-based detection.
    • Signature-based detection works by comparing incoming traffic to a database of known attack signatures.
    • Anomaly-based detection works by taking a baseline of normal traffic and measuring the present state of traffic against it to detect patterns that are not present in normal traffic.

    Secure Protocols

    • Secure protocols can protect data by using secure equivalents of insecure protocols.
    • Examples of secure protocols include Secure Shell (SSH) instead of Telnet, and Secure File Transfer Protocol (SFTP) instead of FTP.

    Network Security Tools

    • Network security tools can improve network security and are often the same as those used by attackers.
    • Examples of security tools include Kismet, coWPAtty, and Aircrack-NG for wireless, Nmap for port scanning, HPing3 for firewall tools, and Tcpdump, WinDump, and OptiView for packet sniffers.

    Honeypot

    • Honeypots are a controversial tool that can detect, monitor, and sometimes tamper with the activities of an attacker.
    • Honeypots are configured to deliberately display vulnerabilities or materials that would make the system attractive to an attacker.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn how to prevent and mitigate attacks by properly segmenting a network into smaller subnets, controlling traffic flow and minimizing damage.

    More Like This

    Network Segmentation and Zero Trust Framework
    32 questions
    Firewall e Segmentazione della Rete
    100 questions
    Diseño de Redes de Computadores Seguras
    41 questions
    Use Quizgecko on...
    Browser
    Browser