Lesson 3.3 given a scenario, implement secure network designs Flashcards
What is an Extranet
A zone created to allow authorized users access to company assets separate from the intranet
What is a intranet?
An internal company zone established to allow employees the ability to share content and communicate more effectively
What is a Demilitarized Zone (DMZ)
area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN
What is a VLAN?
a logical group of network devices on the same LAN, despite their geographical distribution. It can divide the devices logically on the data link layer, and group users according to departments.
What is Data Loss Prevention (DLP)
prevent the removing or sending of protected information, but it cannot scan for malware
What is Unified Threat Management (UTM)
an all-in-one security appliance that combines the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, Data Loss Prevention, content filtering, and many more.
What is firewall?
a software or hardware device that protects a system or network by blocking unwanted network traffic. It is not designed to scan for malware.
what does a virtual ip address do
ensures a smooth transition over to the secondary load balancer if the primary fails. Users or other services will only need to know one destination IP address to reach the web server farm
Describe an active/passive technology
ensure a proper failure capability. Requests will continually flow through one load balancer and through the secondary if the primary fails.
What is a Bridged Protocol Data Unit (BPDU) guard
guard setting is applied to switches. This causes a portfast-configured port that receives a BPDU to become disabled.
Describe east-west traffic
describes the network and platform configurations that support cloud and other Internet services where most traffic is actually between servers within the data center.
Describe zero trust
uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise. It can use micro-segmentation to apply security policies to single node like it was in its own zone
What is something you can do to improve video quality and overall use of the network bandwidth
Switches that support quality of service use the 802.1p header to prioritize frames. This will improve video conferences and make efficient use of the overall network bandwidth.
What is Out of Band management
a means of remote management of a system; a term commonly used when managing network devices
Always on VPN
allow for a continued connection between the geographically separated servers and the employee.
Remote Access VPN
allow an authorized user to connect to an internal network from a remote location. Tunneling protocols encapsulate and encrypt traffic for data protection and integrity
VPN concentrator
incorporates the most advanced encryption and authentication techniques and includes all of the items necessary to create a VPN.
Site-to-site VPN
connects multiple networks versus one. Remote users can access both locations as if they were onsite without noticing the location separation