Chapter 4 - Advance Networking Flashcards

1
Q

What are switches?

A

Connects devices within a network.

Operates in the Data Link layer (layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are routers?

A

Connects multiple networks together.

Operates in the Network Layer (layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are VLANs an example of physical or logical network segmentation?

A

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the other functions of a proxy server?

A

Caching - popular sites can be cached for quicker site retrieval.

Filtering - proxy based white/black listing domains and urls as a security service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two different types of Firewalls?

A

Network-Based Firewalls
- placed in line of network traffic that filters all traffic going in and out of a network

Host-Based Firewalls
- software based firework application that filters traffic in/out of a network node or machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Packet Filtering firewalls?

A

Firewalls that filter data packet based on headers such as IP address, ports, protocols etc.

Filtering based on a Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Access Control List?

A

A list that determines whether traffic is permitted or rejected.

Rules are analyzed from top to bottom to see if any rules match the traffic.

At the bottom of ACL should contain - Deny ‘ANY ANY ANY’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Stateful Inspection Firewalls?

A

Stateful Inspection firewalls analyze packets for the entirety of the session.

Packet filtering firewalls only analyze each packet as an individual object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Application Proxy Firewalls?

A

Application Proxy Firewalls are firewalls with added capabilities of analyzing protocol specific commands.

The firewall understands data and commands for many protocols such as HTTP, SMTP etc.

Admins can configure these firewalls based on some commands and actions regarding a specific protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Unified Threat Management Devices? (UTM)

A

UTM’s are a single device that houses multiple firewall and security capabilities such as:
- Packet Filtering
- Malware Blocking through AV
- URL management
etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the purpose of tunneling protocols?

A

Tunneling protocols encapsulate and encrypt this encapsulated data prior to data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two constituents of IPSec?

A

Authentication Headers (AH) for authentication and integrity (protocol 51)

Encapsulation Security Protocol (ESP) for data encryption prior to transmission. (protocol 50)

L2TP/IPSec are used in conjunction together as an effective tunneling protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the problems of using L2TP as a tunneling protocol?

A

Using a NAT service with L2TP corrupts the encrypted data.

NAT-T was created to allow L2TP/IPSec data to pass through NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two different IPSec modes?

A

Tunnel Mode:
- The entire packet is encapsulated, encrypted and transported over the Internet.

Transport Mode:
- Only the payload data is encrypted.
- This improves network performance and used for internal traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the Challenge Handshake Authentication Protocol (CHAP) work?

A
  1. Server sends a “number used only once” nonce to the client.
  2. Client received the nonce, combines it with a shared secret between client and server.
  3. Nonce + shared secret is then hashed.
  4. Hash is sent to server for validation as it also knows the shared secret
  5. If hashes match, client is authenticated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CHAPv2?

A

CHAPv2 is the same as CHAP but instead requires mutual authentication - the server also needs to authenticate to the client.

17
Q

What purpose does a RADIUS server serve?

A

RADIUS server provides a centralized AAA service.

Clients connecting to a remote server passes the credentials to the RADIUS server for AAA.

RADIUS uses UDP

RADIUS only encrypts the password during authentication.

18
Q

What is a Diameter service?

A

Similar to RADIUS but uses TCP instead of UDP.

Diameter also supports IPSec and TLS

19
Q

What is TACACS+

A

Another AAA alternative to RADIUS and Diameter.

TACACS+ encrypts the entire authentication process.

TACACS+ uses TCP 49

20
Q

What is traffic shaping?

A

Traffic Shaping is the process where certain traffic types are prioritized over other traffic types in a network to improve performance.

21
Q

What purpose does the Network Access Control serve (NAC) ?

A

NAC controls which clients are allowed to connect to a network.

The NAC checks the health of the potential client to determine if it can connect to the network.

Checks such as:
- AV software installed
- Patches installed
- Host-Based FW enabled

Among many other requirements set by the network admin.

Any clients that are deemed ‘unhealthy’ are quarantined to a different network where they can access resources to improve their ‘health’ - patches, software packages etc.

Quarantine VLAN also allows for monitoring should the device be deemed malicious.

22
Q

What is a VM Hypervisor?

A

A Hypervisor manages different VM’s that run on the physical device.

23
Q

What are the two different types of VDIs that employees can use?

A

Persistent:
- Changes made are saved and stored

Non-Persistent:
- Any changes made are not saved and the VDI reverts to its original configuration once powered down or restarted.

24
Q

What are the Data and Control planes in relation to hardware routers?

A

The Data Plane uses ACL rules to determine whether the router will pass or block traffic.

The Control Plane uses routing protocols to map the network and determine paths to other networks.

25
Q

What are SaaS, PaaS and IaaS?

A

Software as a Service

Platform as a Service

Infrastructure as a Service

26
Q

What is a Community Cloud?

A

Cloud platform shared by two or more organizations.

Typically provides a way to share data between organizations.