Networking Flashcards

1
Q

Switches: Bridge traffic in hardware using an application called?

A

ASIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAC 802.1X

A

This means you need to authenticate with a username and password before accessing a switch interface (port based). Either by using Extensible Auth Protocol or RADIUS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Looping prevention

A

802.1D to prevent loops. Spanning Tree Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Flood Guard

A

Flood the mac address table causing the table to overflow causing a DOS. If you incorporate a flood guard, that will give a maximum number of MAC addresses allowed on a particular interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are proxies useful for?

A

Cashing information, content scanning, access control and url filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explicit proxy

A

You need to configure your OS or browser to use the proxy to be able to communicate to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transparent proxy

A

End users don’t know a proxy is in the middle. No configuration is needed in the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application proxy

A

NAT. Some proxies know only HTTP. More advanced know HTTPS, FTP etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forward proxy

A

A proxy which is in the inside of our network to help users protect themselves from the internet, this is a forward proxy. Used internally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reverse proxy

A

External, want to connect to internal. First need to connect to a proxy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Open proxy

A

Set up and configured by a 3rd party. User can go around URL filtering by using an open proxy which allows the user to see an illegal site. (Like at school when playing games were blocked). Open proxy makes the request to the site on your behalf. Downside: Owner of the open proxy could manipulate the url response from the site back to the proxy then add malicious code to send back to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly