3.3 Implement Secure network Designs Flashcards

1
Q

Load Balancer

A
  • Uses a Virtual IP
    • TCP overhead can be offloaded on the load balancer to maintain fast connections to servers
  • SSL offloading performs the encryption and encryption of SLL on behalf of the servers and sends data in the clear to the servers
  • Caching can be used to store copies of common responses and respond fast to requests without connecting to servers
  • prioritization quality of service (QOS) for certain applications on servers
  • Content switching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Load balancer Scheduling Active/Active

A

All servers are active, if one fails, others will pick up the load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Round Robin

A

Each server is selected in turn 1 by 1

an equal amount of load on all servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Weighted Round Robin

A

Prioritize Server use

Some servers may have more or less load than others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic Round-Robin

A

Monitors the server load and distributes it to the server with the lowest use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Affinity/ sticky session/ session persistence

A

Applications may require communication to the same instance

  • Can ensure users are always communicating to a specific server
  • tracked through IP address or Session IDs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Load balancer Scheduling Active/Passive

A

Some are active some are on standby

- if an active server fails, an inactive one will boot up and take its place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL VPN

A
  • Uses SSL/TLS Protocol over 443
  • no requirement for digital certificates or shared passwords like IPsec
  • can be run from a light VPN client or browser across many OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTML5 VPN

A

HTML5 used in web browsers
- provides a web cryptography API
no need to install a separate VPN client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

L2TP

A

Layer 2 tunneling protocol
connect sites over the public internet (Layer 3) to another private network as if they were on layer 2
Commonly used with IPsec
L2TP establishes the tunnel, IPsec used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPsec Transport Mode

A

It protects data in the packet but does mot protect Ip info such as headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tunnel Mode

A

Protects Data and IP info by adding a new IP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port security: STP RSTP

A

Switch loop or broadcast loop - two ports connected together on a switch.
Spanning Tree Protocol (STP) or newer Rapid STP (RSTP) prevents Broadcast storm and loop prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BPDU Guard

A

STP uses BPDU

Can disbale ports to prevent switch looping as it can detect if a switch has connected to the port through BPDU messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly