3.3 Implement secure network design Flashcards

1
Q

Its purpose is to obtain more optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading, and eliminate bottlenecks. It is used to spread or distribute network traffic load across several network links or network devices.

A

Load Balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A form of load balancing that uses all available pathways or systems during normal operations.

A

Active/active (Load balancing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A form of load balancing that keeps some pathways or system in an unused dormant state during normal operations.

A

Active/passive (Load balancing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves controlling traffic among networked devices. This can be imposed with switches using VLANs, using RFC 1918 private IP addresses, TTL/hop limit manipulation, or through other traffic-control means, including MAC addresses, IP addresses, physical port, TCP or UDP ports, protocols, or application filtering, routing, and access control management.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A switch-imposed network segmentation.

A

Virtual Local Network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A special-purpose subnet that is designed specifically for low-trust users to access specific systems, such as the public accessing a web server.

A

Screened subnet (Net Seg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A privately controlled network segment or subnet that functions as a screened subnet for business-to-business transactions.

A

Extranet (Net Seg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A private network or a private LAN

A

Intranet (Net Seg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A communication channel between two entities across an intermediary network. They provide several critical security functions, namely, access control, authentication, confidentiality, and integrity.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly