CF Interview Flashcards
What is a DDoS attack?
A DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
What is Cloudflare?
Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.
• Secure your websites, APIs, and Internet applications.
• Protect corporate networks, employees, and devices.
• Write and deploy code that runs on the network edge.
What is CND?
content delivery network
A geographically distributed group of servers which work together to provide fast delivery of Internet content.
Describe DNS
Domain Name System (DNS)
The Domain Name System (DNS) is the phonebook of the Internet. DNS translates domain names to IP addresses.
Why CloudFlare?
I believe in Cloudflare’s mission to help build a better Internet.
I believe in Cloudflare’s superior products and the hollistic approach used to help everything that connects to the Internet more secure, private, fast, and reliable.
I believe in Cloudflare’s inclusive culture and CF Capabilites, behavior that I already live my life by.
I believe that I belong at CF.
Tell me about a time when you had a disagreement with a co-worker?
Can you explain the tech behind Cloudflare?
Tell me a company you admire and why?
Tell me something you have taken on during the pandemic.
Cloudflare Web Application Firewall
The Cloudflare Web Application Firewall (WAF) provides both automatic protection from vulnerabilities and the flexibility to create custom rules. OSI layer 7 intelligent, integrated, and scalable solution to secure your web applications, without changing your existing infrastructure or sacrificing performance. The Cloudflare WAF protects against a large number of web attack vectors including file inclusion, Cross-Site Scripting attacks, SQL injections, and many other vulnerabilities.
OWASP
The Open Web Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. The Open Web Application Security Project (OWASP) provides free and open resources. It is led by a non-profit called The OWASP Foundation. The OWASP Top 10 - 2021 is the published result of recent research based on comprehensive data compiled from over 40 partner organizations.
Cloudflare Access
Cloudflare Access replaces corporate VPNs with Cloudflare’s network. Instead of placing internal tools on a private network, customers deploy them in any environment, including hybrid or multi-cloud models, and secure them consistently with Cloudflare’s network.
Prevent lateral movement and reduce VPN reliance. Free for up to 50 users.
Works with your identity providers and endpoint protection platforms to enforce default-deny, Zero Trust rules that limit access to corporate applications, private IP spaces and hostnames. Connects users faster and more safely than a VPN.
Cloudflare Gateway
Cloudflare Gateway is a modern next generation firewall between your user, device or network and the public Internet. Once you setup Cloudflare Gateway, Gateway’s DNS filtering service will inspect all Internet bound DNS queries, log them and apply corresponding policies.
Cloudflare Tunnel
Cloudflare Tunnel (formerly Argo Tunnel) establishes a secure outbound connection which runs in your infrastructure to connect the applications and machines to Cloudflare.
WARP client
Teams customers can use the Cloudflare WARP application to connect corporate desktops to Cloudflare Gateway for advanced web filtering. The Gateway features rely on the same performance and security benefits of the underlying WARP technology, with security filtering available to the connection.
What is UDP?
The User Datagram Protocol, or UDP, is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. This allows data to be transferred very quickly, but it can also cause packets to become lost in transit — and create opportunities for exploitation in the form of DDoS attacks.
What is a network protocol?
In networking, a protocol is a standardized set of rules for formatting and processing data. Protocols enable computers to communicate with one another.
autonomous systems (AS)
An autonomous system (AS) is a very large network or group of networks with a single routing policy. Each AS is assigned a unique ASN, which is a number that identifies the AS.
When and where was CF launched?
Time to live (TTL)
Time to live (TTL) refers to the amount of time or “hops” that a packet is set to exist inside a network before being discarded by a router. TTL is also used in other contexts including CDN caching and DNS caching.
What is the Internet Control Message Protocol (ICMP)? (L3 Protocol)
ICMP: The Internet Control Message Protocol (ICMP) handles error reports and testing. A connectionless protocol, ICMP does not use a transport protocol like TCP or UDP. Rather, ICMP packets are sent over IP alone. Developers and networking engineers use ICMP for its ping and traceroute functions. Typically only one ICMP packet needs to be sent at a time. ICMP is commonly used to flood a server with too many pings to respond to, or with one large ping packet that crashes the receiving device (this is known as the “ping of death”)
ICMP ping of death attacks are not possible with modern hardware, which ignores IP packets that are too large.
Smurf Attack
In a Smurf attack, the attacker sends an ICMP packet with a spoofed source IP address. Networking equipment replies to the packet, sending the replies to the spoofed IP and flooding the victim with unwanted ICMP packets. Like the ‘ping of death,’ today the Smurf attack is only possible with legacy equipment.
Network layer attack
A ping flood or ICMP flood
A ping flood or ICMP flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources until legitimate users cannot receive service.
Network layer attack