Basic Network Devices Flashcards

1
Q

BPDU guard prevents what from happening? How

A

It prevents a rogue switch from becoming the root bridge. It does this by preventing Bridge Protocol Data Units being received from a switch that isn’t already known to the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BPDU guard is typically applied to which ports?

A

Access ports that don’t connect to known switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Besides BPDU guard, what other feature helps to protect the STP topology and where would you apply it?

A

Root Guard.
On all ports on the ROOT BRIDGE only (you don’t want any of the ports on the root bridge being told to point out to another root bridge, there should only be one)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Root Guard work?

A

If the root bridge receives a BPDU with a superior priority number it disables the port connecting to that switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router ACL’s filter packets based on what 3 criteria?

A

IP address
Protocol
Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL’s are applied on routers/firewalls or hosts using software, but what do you apply an ACL to?

A

The Ingress or Egress of an interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How would you apply anti-spoofing on a router?

A

you would deny incoming traffic from the private address ranges for each of the address classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type the command to deny class B private addresses inbound on a router interface

A

deny ip 172.16.0.0 0.15.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between a stateful and a stateless firewall?

A

a stateful firewall will keep track of the status of TCP sessions and block traffic that isn’t part of an established session. A stateless firewall only uses ACL criteria to permit/deny traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Would you replace a firewall with a WAF?

A

No. WAFs are an added layer of protection in addition to the regular firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ACL applied to protocols instead of interfaces is known as what?

A

Distribution List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stateful firewalls work by using the TCP 3-way handshake but can also keep track of connections using UDP. TRUE or FALSE?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ACLs can categorize and queue packets for applications that require QoS, TRUE or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a nontransparanet proxy improve security?

A

because it can filter requests to web pages using URL filters, restricting access to content that may contain malware. Transparent proxies don’t do any filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can a reverse proxy increase security?

A

It removes the need for direct connections to a web server, thereby adding a layer of protection. It also means the web server can be placed in the private network and not the DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

reverse proxies can act as load-balancers, true or false?

A

TRUE

17
Q

what device can perform URL filtering, spam filtering, malware inspection, content inspection and DDoS mitigation?

A

Unified Threat Management Device

18
Q

two key features of a mail gateway that increase security?

A

1 - mail encryption

2 - data loss prevention capabilities (content filtering)

19
Q

Which network management protocol uses UDP ports 161 and 162?

A

SNMPv3

20
Q

Flood guards protect against what and are often implemented on what device?

A

They protect against packet floods like SYN floods or ping/icmp floods or port floods by scanning. Commonly implemented on IDS/IPS