Operation of Infrastructure Flashcards

4.2.1

1
Q

Secure Network Components

A

make up the backbone of the logical infrastructure for an organization. These components are often critical to day to day operations, and an outage or security issue can be very costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Modems

A

Provide modulation/demodulation of binary data into analog signals for transmission. A type of channel service unit (CSU)/Data Service Unit (DSU) typically used for converting analog signals into digital.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Channel Service Unit (CSU)

A

Handles communication to the provider network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Service Unit (DSU)

A

Handles communication with internal digital equipment (in most cases, a router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewalls

A

Essential tools in managing and controlling network traffic. Used to filter traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Switch

A

repeats traffic only out of the port on which the destination is known to exist. Offer greater efficiency for traffic delivery, create separate collision domains, and improve the overall throughput of data. Usually operates on layer 2 but sometimes layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routers

A

Used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two. Operates on layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gateways

A

connects networks that are using different network protocols. Also known as the protocol translators, can be stand alone hardware devices or a software service. Operates on layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Repeaters, Concentrators, and Amplifiers

A

used to strengthen the communication signal over a cable segments as well as connect network segments that use the same protocol. operates on layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bridges

A

Used to connect two networks (even networks of a different topologies, cabling types, and speeds) in order to connect networks segments that used the same protocol. operates on layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hubs

A

were used to connect multiple systems and connect network segments that use the same protocol. A multiport repeater. Operates on layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LAN Extenders

A

A remote access, multilayer switch used to connect distant networks over WAN links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Static Packet Filtering Firewalls

A

Filters traffic by examining data from a message header (source/destination address, ports, protocol) Operates on the Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Level Firewalls

A

filters traffic based on a single internet service, protocol, or application. Operates at application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circuit Level Firewalls

A

Used to establish communication sessions between trusted partners. Operate at the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateful Inspection Firewalls

A

Evaluate the state, session, or the context of network traffic. In order words review the header

17
Q

Deep Packet Inspection Firewalls

A

filtering mechanism that operates typically at the application layer in order to filter the payload contents of communication rater than only on the header values. In other words review the payload.

18
Q

Web Application Firewalls (WAF)

A

Protects web applications by filtering and monitoring HTTP traffic between a web application and the internet.
Typically protects web applications from common attacks like XSS, CSRF, and SQL injection

19
Q

Next Generation Firewalls (NGFW)

A

a deep packet inspection firewall that moves beyond port/protocol inspection and blocking.
Adds application-level inspection, intrusion prevention, and brings intelligence from outside the firewall

20
Q

Redundant Power

A

Typically used with components such as servers, routers, and firewall. Paired with other types of redundancies to provide high availability.

21
Q

Warranty and Support

A

Orgs should maintain a current and active warranty on all network devices to provide coverage in the event of a system mulfunction.

22
Q

Bastion Host

A

A type of firewall or host computer that is exposed on the internet and has been hardened by removing all unnecessary elements such as services, programs, protocols, and ports

23
Q

Screen Host

A

is a firewall protection system logically positioned just inside a private network. Is the most secure option

24
Q

Screened Subnet

A

Creates a DMZ network between trusted and untrusted

25
Q

Proxy Server

A

functions on the behalf of the client requesting service, masking the true origin of the request to the resource.

26
Q

Wireless Access Points (WAP)

A

Network device that allows wireless enabled devices to connect to a wired network. Connects directly to a wired LAN and then provides wireless connections into that wired LAN using Wifi.