Internet Appliances Facts Flashcards

1
Q

_____ is responsible for ensuring network uptime, security, and access to network resources.

A

network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet appliances can be implemented to help make the network administrator’s job easier by:

A

-automating tasks
-providing network security
-monitoring the network for potential issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet appliances can come in two forms:

A

-One form is an embedded system that contains all hardware and software in one device.
-The other form is software running on a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You can use a _____ to monitor the servers and distribute traffic so one server does not get overwhelmed

A

load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ work by reading the information in the packet headers of incoming traffic and using algorithms to determine the best flow of traffic.

A

Network layer load balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Round robin

A

is the most basic algorithm. the servers handle network requests in sequential order. The load balancer does not monitor each server’s current load, as it assumes the servers can handle each request in the same amount of time.
This can still lead to a server getting overwhelmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This algorithm works the same as the round robin, but takes the server’s power into consideration. A more powerful server is sent more traffic than less powerful servers.

A

Weighted round robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ algorithm looks at the active connections each server is handling and sends the network traffic to the server that currently has the lowest number of connections.

A

The least connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Least connections treats each network request equally.
Does not take into account that some requests require more time.
Does not take into account the power of each server.

A

facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of least connections is

A

if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example of least connections is

A

if a request comes in that will take a long time to process, the load balancer can’t take this into consideration. It might direct that traffic to the next server in line, but that server might already be dealing with another request. This can cause that server to get backed up and slow down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This algorithm distributes traffic based on the active connections and the processing power of each server.

A

weighted least connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This algorithm creates a hash key based on the source and destination IP addresses. The hash key is assigned to a server and all requests for the remainder of the active session are handled by that same server.

A

Source IP hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-makes decisions based solely on the data in the packet header which results in a lot of guesswork.
-This can lead to inefficient distribution of traffic between the servers.

A

network layer load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ can distribute traffic based on the content of network packets including the HTTP header, HTTP message, and the session cookies.

A

application layer load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The application layer load balancer also tracks the responses from the servers, so it can keep track of whether the session will continue or not. This allows the load balancer to make routing decisions based on data and not guess work. (true or false)

A

true

17
Q

The application layer load balancer most commonly uses the least pending request (LPR) algorithm. This algorithm monitors all pending requests and routes them to the most available server. This algorithm allows the load balancer to continue to monitor all server loads and instantly make adjustments in case there’s a sudden surge of incoming connections.

A

facts

18
Q

Spam email can be extremely dangerous to the network as it can introduce malware and clog the network. (true/false)

A

true

19
Q

You can use a _____ internet appliance to monitor incoming and outgoing emails to reduce the amount of spam affecting the network.

A

spam gateway

20
Q

The spam gateway can block incoming spam emails using these methods: (1/3)

A

1) Comparing sender addresses to a blocklist.
Example: If the sender is on a blocklist, the email is blocked. The problem with using this method is that it is fairly easy to bypass the blocklist by spoofing (faking) the sender’s email address.

21
Q

The spam gateway can block incoming spam emails using these methods: (2/3)

A

2) Using email authentication technologies on the spam gateway.

22
Q

The spam gateway can block incoming spam emails using these methods: (3/3)

A

3) Checking embedded links in the email.
Explain: If the link redirects to a malicious site, the email will be blocked.

23
Q

Some spam gateways monitor outgoing emails to prevent spam emails from leaving the network. If spam emails come from the organization’s domain, the domain can be added to other organizations’ blocklists. (true/false)

A

true

24
Q

DMARC:

A

-Verifies the email sender.
-Tells the recipient what to do if neither authentication method passes.
-Allows the recipient to tell the sender about messages that pass or fail DMARC authentication.

25
Q

_____ is an internet appliance that you can implement on the network

A

proxy server

26
Q

The proxy server is typically configured to monitor all incoming and outgoing network traffic. It determines if the traffic is allowed or not. (true or false)

A

true

27
Q

The _____ can configure the proxy server to block specific categories of content, such as gambling websites.
The _____ also keeps internal users anonymous since all outgoing traffic shows as coming from the proxy server.

A

network administrator, proxy server

28
Q

In many instances, the proxy server also caches information from sites on the internet. It works like this:

A

-When a client computer requests an allowed website, it directs the traffic to the site and caches a copy of it.
-When a second or subsequent request for that website is made, rather than go to the internet to get that site’s information, the proxy server provides the cached content.
-This eliminates repetitive requests and speeds up internet queries.
-At configured intervals, the proxy server re-caches website information so the cache doesn’t become stale.

29
Q

_____ combines multiple functions into a single device.

A

The unified threat management (UTM) internet appliance

30
Q

The _____ is responsible for monitoring and controlling all incoming and outgoing traffic.

A

firewall

31
Q

-The firewall controls the flow of data based on rules that have been configured by the network administrator.
-Most firewalls are configured to detect the type of traffic; the source and destination addresses; and ports.
(true/false)

A

true

32
Q

_____ monitors all network traffic looking for anything out of the ordinary.

A

Intrusion prevention system (IPS)

33
Q

When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team so further action can be taken. (true/false)

A

true

34
Q

Anti-malware

A

Many UTM appliances use anti-malware software to detect and prevent malware from infecting the network.
Malware can include viruses, spyware, ransomware, and other malicious software. It should be blocked from the network. Malware programs can devastate a network by destroying, stealing, or blocking access to critical data and infrastructure.

35
Q

Content filtering

A

Similar to the proxy server, the UTM can monitor HTTP requests and block unauthorized web sites. The rules are configured by the network administrator.

36
Q

The unified threat management appliance can provide other functions such as routing functions, VPN support, NAT, etc. More advanced UTM appliances can implement other appliances such as the load balancer, proxy server, spam gateway, etc.

A

facts

37
Q

combines the protections of both Domain Keys Identified Mail (DKIM) and Sender Policy Frameworks (SPF)

A

Domain-based Message Authentication, Reporting, and Conformance (DMARC).

38
Q

protect users from malicious emails.

A

Sender Policy Frameworks (SPF)