Modules 16-17 Building and Securing a Small Network Flashcards
Which factors do we need to think about when selecting network devices?
Cost
Speed and types of ports/interfaces
Expandability
Operating system features and services
When creating a network, what do we need to think about when it comes to IP addressing?
All hosts and devices within the network must have unique address.
When creating a network, what do we need to think about when it comes to IP addressing? Which Devices get Ip address?
All hosts and devices within the network must have unique address.
End user devies, Servers nad peripherals, Intermediar devices
How can we obtain a high degree of reliability in a network
Network redundancy: Helps eliminate single points of failure.
Can be accomplished by installing duplicate equipment and supplyting duplicate network links for critical areas.
What is priority queue? Which queues do we have?
Different queues in a network where the high.priority queue is always emptied first
Four queues
Voice HIGH
SMTP MEDIUM
Instant messaging NORMAL
FTP LOW
Which two forms of software programs or processes provide access to the network?
Network applications: Applications that implement application layer protocols and are able to communicate directly with the lower layers of the protocol stack
Application layer services: For applications that are not network-aware, the programs that interface with network and prepare the data for transfer.
Which factors must a small network administratot consider when supporting real-time applications?
Infrastructure : Infrastructure - Does it have the capacity and capability to support real-time applications?
Voice over IP - VoIP is typically less expensive than IP Telephony, but at the cost of quality and features.
IP Telephony - This employs dedicated servers form call control and signaling
Real-Time Applications - The network must support Quality of Service (QoS) mechanisms to
minimize latency issues. Real-Time Transport Protocol (RTP) and Real-Time Transport Control
Protocol (RTCP) and two protocols that support real-time applications.
Which elements are required to scale a network?
Network documentation : Physical and logical topology
Device inventory: List of devices that use or comprise the network.
Budget: Itemized IT budget
Traffic analysis: Protocols, applications and services and their respective traffic requirements should be documented.
What is important to do when determining traffic flow patterns?
Capture traffic during peak utilization times
Perform capture on different netowkr segments
Information gathered by the protocol analyzer is evaluated based on the source and destination of the traffic.
Which steps do we go through when we troubleshoot?
1 Identify problem
- Establish a theory of probable causes
- Test the Theory to determine cause
- Establish a plan of action and implement a solution
- Verify solution and implement prevenetive measure
- Document findings, actions, and outcomes.
Why is network security important?
To protect organization/enterprise assets
To comply with local cyber regulations Breach/fines
To gain competetive advantage - trust in the internet era.
What are the 3 legs of security
Prevention
- Measures to prevent exploitations of vulnerabilities
- Important than detection/response
Detection
- If prevention fails, procedures to detect
- Sooner the better
Response
-Incident management plan
What is a threat? Which 2 types of main groups of threats do we have?
Action that can disrupt the operation, functioning, integrity or availability of system or network.
Natural threats , earthquakes, flood etc
Intentional cyber related with malicious purpse
Which 4 types of cyber threats do we have?
Information theft
Data loss and manipulation
Identity Theft
Disruption of service
What is a threat profile?
A threat profile consider individual threats and classified by their impact.
_build asset-based threat profile
Identify vulnerabilities from Vulnerability Profile
Develop Security Strategy and Plan