Section 3.3 Implementing secure network designs Flashcards
What provide a first line of defense for detection and prevention attacks at your network border?
Network security devices and secure network design
What is a network device that helps evenly distribute the flow of network traffic to other network devices, either in an active/active mode or an active/passive mode?
Load balancer
If one router receives too many requests what could happen?
A bottleneck or network delays
What are required to analyze incoming requests and route them evenly between servers?
Load balancer
What can schedule their functions through different techniques or can use intelligent methods to detect which servers are overloaded and which are free?
Load balancers
What prevent DoS network attacks by detecting floods of network packets and prevents them from overloading a device?
Load Balancer
What enhances load balancing by making routing the resources of all servers so they can be used to perform the same task as one server?
Clustering
In what mode of load balancing do the load balancers act like an array, dealing with traffic together as both are active?
Active/Active mode
What eliminates a host’s dependency upon individual network interfaces?
a Virtual IP address
Web traffic comes into the network load balancer from the?
Virtual IP Address
What NLB setting knows the status of all servers in the server farms and which web servers are the least utilized by using a scheduling algorithm?
Least Utilized Host
What NLB setting takes the incoming request then contacts the DNS server and rotates the request based on the lowest IP address first?
DNS round Robin
What NLB setting sends the request to the same web server based on the requester’s IP address, IP + port, and/or session ID?
Affinity
What do you call a private network that is designed to host the information internal to the organization?
Intranet
What do you call a section of an organization’s network that has been sectioned off to act as an intranet for the private network but also serves information to external business partners or the public internet?
Extranet
What do you call an extranet for public consumption that is typically labeled a DMZ or perimeter network?
Screened Subnet
What is used to control traffic and isolate static/sensitive environments?
Network segmentation
What do you call a collection of devices that communicate with one another as if they made up a single physical LAN?
VLAN
What do you call a subnet that is placed between two routers or firewalls?
Screened subnet
Bastion hosts are located within which subnet?
Screened subnet
What extends a private network across a public network, enabling users and devices to send and receive data across shared or public networks as if their computing devices were directly connected to the private network?
VPN
What is the most secure VPN tunneling protocol that can use certificates, Kerberos authentication, or a pre-shared key?
L2TP/IPSec
What VPN works with legacy systems and uses SSL certificates for authentication?
Secure Socket Layer VPN
What VPN uses certificates for authentication and just needs and HTML-5 compatible browser such as Opera, Edge, Firefox, or Safari?
HTML 5 VPN
What mode of VPN means all traffic both the internet and the corporate network run through the VPN?
Full Tunnel
What mode of VPN is used for traffic destined for the corporate network only and internet traffic is sent through its normal route?
Split Tunnel
In what kind of scenario is a connection initiated from a users PC or laptop for a connection of shorter duration?
Remote Access Scenario
What do you call a hierarchical naming system that resolves a hostname to an IP address?
DNS
What type of record is a text record used by DNS to prevent spam and confirm the email has come from the domain it appears to come from?
Sender Policy Framework
What type of record is used for mail servers?
MX
What type of record is a DNS text that is used by ISPs to prevent malicious email, such as phishing or spear phishing attacks?
Domain-based Message Authentication, Reporting and Conformance (DMARC)