CompTIA Security+ SY0-701 - ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Domain 3.0 Study Guide exam with ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
correct answers ||\\||\\
physical isolation - correct answers ✔✔Devices are ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
physically separated ||\\||\\
- Air gap exists between different equipments
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Must be connected to provide communication ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Web servers in one rack ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Different customers have different switches ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Virtual Local Area Network (VLAN) - correct answers ✔✔a ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
logical network that can separate physical devices without
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
regard to the physical location of the device. Usually cant
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
communicate without Layer 3 device/ router ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,Software Defined Networking (SDN) - correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
✔✔Networking devices have different planes of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
operation
- Data, control, and management planes
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Split the functions into separate logical units
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Extend the functionality and management of a single
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
device
- Perfectly built for the cloud
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Infrastructure layer / Data plane - correct answers ✔✔- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Process the network frames and packets
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Forwarding, trunking, encrypting, NAT
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Control Layer / Control Plane - correct answers ✔✔-
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Manages the actions of the data plane- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
-Dynamic Routing tables, session tables, NAT tables. ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Dynamic routing protocol updates
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,Application layer / management plane - correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
✔✔- Configure and manage the device
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- SSH, browser, API
||\\||\\ ||\\||\\ ||\\||\\
SDN data flows - correct answers ✔✔Application Layer /
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Management plane ( SSH, SNMP, API) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Control Layer / Control Plane (Dynamic routing protocol) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Infrastructure Layer / Data Plane (Network Traffic) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
SDN Security - correct answers ✔✔Due to SDN's plane
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
separation, security must be implemented for each ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
interface. After designing the SDN architecture, security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
methods should be considered. The chosen security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
solution must be secure, scalable, and efficient ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Secure places to store data - correct answers ✔✔- On- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
premises
- In the cloud
||\\||\\ ||\\||\\ ||\\||\\
, Cloud-Based Security - correct answers ✔✔- Centralized ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and costs less; no data center to secure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Third party handles everything
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
On-premises security - correct answers ✔✔Puts security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
burden on client, data center and infrastructure security
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
costs
On-Premises Security Pros - correct answers ✔✔- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Customize security posture ||\\||\\ ||\\||\\
- On-Site IT team can manage security better
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Local team maintains uptime and availability
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
On-Premises security Con - correct answers ✔✔- Local ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
team can be expensive and difficult to staff
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Security changes can take time to install, configure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
among other costs ||\\||\\ ||\\||\\
Domain 3.0 Study Guide exam with ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
correct answers ||\\||\\
physical isolation - correct answers ✔✔Devices are ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
physically separated ||\\||\\
- Air gap exists between different equipments
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Must be connected to provide communication ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Web servers in one rack ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Different customers have different switches ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Virtual Local Area Network (VLAN) - correct answers ✔✔a ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
logical network that can separate physical devices without
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
regard to the physical location of the device. Usually cant
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
communicate without Layer 3 device/ router ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,Software Defined Networking (SDN) - correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
✔✔Networking devices have different planes of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
operation
- Data, control, and management planes
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Split the functions into separate logical units
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Extend the functionality and management of a single
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
device
- Perfectly built for the cloud
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Infrastructure layer / Data plane - correct answers ✔✔- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Process the network frames and packets
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Forwarding, trunking, encrypting, NAT
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Control Layer / Control Plane - correct answers ✔✔-
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Manages the actions of the data plane- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
-Dynamic Routing tables, session tables, NAT tables. ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Dynamic routing protocol updates
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,Application layer / management plane - correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
✔✔- Configure and manage the device
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- SSH, browser, API
||\\||\\ ||\\||\\ ||\\||\\
SDN data flows - correct answers ✔✔Application Layer /
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Management plane ( SSH, SNMP, API) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Control Layer / Control Plane (Dynamic routing protocol) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Infrastructure Layer / Data Plane (Network Traffic) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
SDN Security - correct answers ✔✔Due to SDN's plane
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
separation, security must be implemented for each ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
interface. After designing the SDN architecture, security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
methods should be considered. The chosen security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
solution must be secure, scalable, and efficient ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Secure places to store data - correct answers ✔✔- On- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
premises
- In the cloud
||\\||\\ ||\\||\\ ||\\||\\
, Cloud-Based Security - correct answers ✔✔- Centralized ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and costs less; no data center to secure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Third party handles everything
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
On-premises security - correct answers ✔✔Puts security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
burden on client, data center and infrastructure security
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
costs
On-Premises Security Pros - correct answers ✔✔- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Customize security posture ||\\||\\ ||\\||\\
- On-Site IT team can manage security better
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Local team maintains uptime and availability
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
On-Premises security Con - correct answers ✔✔- Local ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
team can be expensive and difficult to staff
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Security changes can take time to install, configure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
among other costs ||\\||\\ ||\\||\\