Network Appliances Flashcards

1
Q

A […] is used to access secure network zones from the outside. SSH into the […], and from there you can SSH into company resources / servers

A

Jump Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A […] sits between the users and the external network, and sends and receives requests on the users behalf.

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explicit Proxy VS Transparent Proxy

A

An explicit proxy needs to be configured on the application or OS you are using

A transparent proxy automatically makes requests on the users behalf without any configuration needed (invisible)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An example of a network level proxy is called […], and modifies the IP address that is used to make a request.

A

NAT Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A […] is used to protect and control users access to the internet

A

Forward or Internal Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A […] is used when users on the internet want to access a server of yours, but you don’t want them directly interacting with it.

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An […] is managed by a third party and is a security concern.

A

Open Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A […] distributes traffic across multiple of the same server to reduce stress on the network. Also adds fault tolerance

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active/Active VS Active/Passive Load Balancing

A

In Active/Active, all servers are utilized at the same time

In Active/Passive, not all servers are being used by the load balancer. If an active server goes down, the load balancer will begin using a passive one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[…] are used to aggregate information from network devices, and may be built into the device itself, (Switches, Routers, Servers, Firewalls), or it’s own separate device, (IPS, IDS, Logs). This information is then sent to a central device called a […] (SIEM)

A

Sensors / Collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly