Exam Objectives 3.2
Given a scenario, apply security principles to secure enterprise infrastructure.
- Infrastructure considerations: Key network design factors
- Device placement: Where devices are located
- Security zones: Network segments with distinct security policies
- Attack surface: Vulnerable points exposed to threats
- Connectivity: Network connections between devices
- Failure modes: How devices respond to failures
- Fail-open: Device allows traffic on failure
- Fail-closed: Device blocks traffic on failure
- Device attribute: Device characteristics
- Active vs. passive: Device interaction level
- Inline vs. tap/monitor: Traffic handling approach
- Network appliances: Devices with specific functions
- Jump server: Secure access intermediary
- Proxy server: Intermediary for client-server requests
- IPS/IDS: Intrusion prevention and detection
- Load balancer: Distributes network traffic evenly
- Sensors: Monitor network traffic for anomalies
- Port security: Protects physical...