Chapter 6 - Network Security Devices, Design, And Technology Flashcards
Bridge
A hardware device or software that is used to join two separate computer networks to enable communication between them.
Switch
A device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices.
Operates at data link layer
Loop prevention
A means to mitigate broadcast storms using the IEEE 802.1d standard spanning-tree algorithm (STA).
MAC flooding attack
Overflowing the switch with Ethernet frames that have been spoofed so that each frame contains a different source MAC address each appearing to come from a different computer. This consumes all the memory for the MAC address table. Once full, the switch enters fail-open mode and functions like a network hub.
Flood guard
A defense against a MAC flooding attack.
Port security
A flood guard technology that restricts the number of incoming MAC addresses for a port.
Router
A device that can forward packets across computer networks.
Operates at network layer.
Access Control List (ACL)
A set of rules to permit or restrict data from flowing into or out of a network.
Antispoofing
A defense used to protect against IP spoofing that imitates another computer’s IP address.
Load balancing
A technology that can help to evenly distribute work across a network.
Load balancer
A dedicated network device that can direct requests to different servers based on a variety of factors.
Round-robin
A scheduling protocol rotation that applies to all devices equally.
Affinity
A scheduling protocol that distributes the load based on which devices can handle the load more efficiently.
Active-passive configuration
A confirmation in which the primary load balancer distributed the network traffic to the most suitable server while the secondary load balancer operates in a “listening mode”.
Active-active configuration
A configuration in which all load balancer are always active.
Forward proxy
A computer or an application program that intercepts user requests from the internal secure network and then processes those requests on behalf to f the users.
Application/multipurpose proxy
A special proxy server that “knows” the application protocols that it supports.
Reverse proxy
A proxy that routes requests coming from an external network to the correct internal server.
Transparent proxy
A proxy that does not require any configuration in the users computer.
Firewall
Hardware or software that is designed to limit the spread of malware.
Host-based firewall
A software firewall that runs as a program on the local computer to block or filter traffic coming into and out of the computer.
Implicit deny
The principle of being always blocked by default.
Network-based firewall
A firewall that functions at the OSI Network layer (Layer 3).
Stateless packet filtering
A firewall that looks at the incoming packet and permits or denies it based on the conditions that have been set by the administrator.
Stateful packet filtering
A firewall that keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Application-based firewall
A firewall that functions at the OSI application layer (layer 7).