Lesson 4: Identifying Infrastructure Services Flashcards

1
Q

What are considered edge services?

A

Edge services generally describe devices that are directly accessible from the Internet and provide access to internal services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which network devices constitute the 1st line of defense (1stLOD)?

A

Edge devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a firewall?

A

A firewall provides a foundational level of protection for any network by blocking or allowing traffic based on a set of pre-configured rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do firewalls filter traffic?

A

To filter traffic, firewall rules are crafted to inspect traffic protocols, IP addresses, and ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are routers used for?

A

Routers forward traffic between subnets by inspecting IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 primary functions of a load balancer?

A

Load balancers are used:
1) To distribute traffic among one of many web servers to handle high-volume workloads better.
2) For fault tolerance, whereby the load balancer can determine if a particular web server in a group is inoperable so that traffic can be re-directed automatically to a different server, avoiding an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What controls can be put in place for a DDoS attack?

A

Rate Limiting - can reduce the amount of throughput available to the server or service being attacked.
Web Application Firewall (WAF) - provides adequate protection of web applications by inspecting traffic for signs of malicious activity through sophisticated rules designed to identify attacks such as CSRF, XSS, SQLi, and many others, preventing these attacks from reaching the target.
Blackhole routing - is not an ideal solution, but it essentially takes all the traffic intended for an endpoint and drops it.
Cloud service providers - provide DDoS protection as a service, and using this approach requires updating DNS to point traffic to the service provider for it to be inspected before it reaches the intended service.
DDoS Mitigation Software/Appliance - provides special-purpose devices and software designed to identify and protect against this attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly