2.3 Flashcards

1
Q

What is a multilayer switch used for?

A
  1. It’s a switch (layer 2) and router (layer 3) in the same physical device
  2. Each function is separate (switching still operates at layer 2 and routing operates in layer 3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a wireless network used for?

A
  1. Wireless networking is pervasive
  2. Your access point may far away from where we use the network.
  3. Configurations may change at any moment
  4. network should be invisible to your users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a wireless LAN controller used for?

A
  1. Centralized management of WAPs (device is alsocalled “pane of glass”)
  2. Deploy new access points
  3. Performance and security monitoring
  4. Configure and deploy changes.
  5. Report om access point use
  6. Usually a propriety system and gets paired with the access points.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a load balancer used for?

A
  1. Distribute the load
  2. Used for Large-scale implementations (Web server farms, database farms)
  3. Fault Tolerant (Server outages have no effect)
  4. Provides TCP offload for protocol overhead (handshake)
  5. SSL offload for encryption/decryption
  6. It uses caching for faster response
  7. Prioritization (QoS)
  8. Content switching in application level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are IDS and IPS used for?

A

(Intreusion Detection System/Intrusion Prevention System)

  1. To watch the network traffic.
  2. Specifically look for intrusions and vulnerabilities
  3. 2 Types:
    a. Detection (Alarm or alert)
    b. Prevention (Stop it before it gets into the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What technologies do IDS and IPS used for identification?

A
  1. Signature based
  2. Anomaly-based
  3. Behavior-based
  4. Heuristics (use AI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a proxy used for?

A
  1. A security device that sits between the users and external network.
  2. Receives the user requests and sends the request on their behalf
  3. Useful for caching info, access control, URL filtering, content scanning
  4. Applications need to know how to use the proxy
  5. Some proxies are invisible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Application proxy used for?

A
  1. Most proxies in use are application proxies
  2. A proxy may only know one application (like HTTP)
  3. Many proxies are multipurpose proxies (Like HTTP, HTTPS, FTP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a VPN Concentrator used for?

A
  1. It’s a device we would install onto our network that would allow us to support VPNs, or Virtual Private Networks.
  2. Encrypts the data going to a public network.
  3. Most are built into firewalls.
  4. Used with a client software (Ex: Kimia VPN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a remote access VPN used for?

A
  1. On-demand access from a remote device which means software connects to a VPN concentrator.
  2. Some software can be configured as always-on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a AAA framework used for?

A
  1. Identification (usually the username)
  2. Authentication (Password and other authentication factors)
  3. Authorization (based on username and password, what access does the use have?)
  4. Accounting (Resources used: login time, data sent and received, logout time.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does RADIUS stand for?

A

Remote Authentication Dial-in User Service [A more common AAA protocols (not just for dial-in)] and available on almost any server operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a RADIUS used for?

A

Centralize authentication for users for:

  1. Routers, switches, firewalls
  2. Server authentication
  3. Remote VPN access
  4. 802.1X network access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is UTM / All-in-one security appliance?

A

Unified Threat Management / Web security gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a UTM used for?

A
  1. URL filter / Content inspection
  2. Malware inspection
  3. Spam filter
  4. CSU / DSU
  5. Router ,Switch
  6. Firewall
  7. IDS / IPS
  8. Bandwidth shaper
  9. VPN endpoint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does NGFW stand for?

A

Next-Generation Firewall (OSI Application Layer: layer 7 firewall) and they are super secured and requires some advanced decodes which means every packet must be analyzed, categorized, and a security decision determined

17
Q

Whats does PBX stand for?

A

(Private Branch Exchange)

18
Q

What does VoIP PBX do?

A

Integrates VoIP devices with corporate phone switches.

19
Q

What does VoIP Gateway do?

A

It converts between VoIP protocols and traditional PSTN protocols and its often built’in to the VoIP PBX

20
Q

What is content filtering used for?

A
  1. It’s used for controlling traffic based on data within the content (data in the packets)
  2. Corporate control of outbound and inbound data (sensitive materials)
  3. Control of inappropriate content (parental control, not safe for work)
  4. Protection against Evil (anti-virus, anti-malware)