secure network designs Flashcards

1
Q

A network-based firewall analyzes packets at the layer _ or _____ of the OSI

A

2

data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An application firewall analyzes packets at layer _ or the _____.

A

7

application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ will ensure a proper failure capability. Requests will continually flow through one load balancer and through the secondary if the primary fails.

A

active/passive topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switches that support quality of service uses the _____ header to prioritize frames. This will improve video conferences and make efficient use of the overall network bandwidth.

A

802.1p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is a means of remote management of a system; a term commonly used when managing network devices.

A

Out-of-band (OOB) management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The _____ is the code and metrics that determine which node is selected for processing each incoming request

A

scheduling algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An _____ configuration sends all requests to one node while the other node is on standby. The secondary node takes over services when the primary node loses connectivity or goes offline.

A

active/passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ allow an application-layer load balancer to keep clients connected to a session. This is achieved with a cookie at the client.

A

Persistence settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is principally designed to prevent broadcast storms. These storms occur when a bridged network contains a loop and broadcast traffic is amplified by the other switches. This can disrupt the network services.

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is a network setting that inspects traffic on access ports to ensure that a host is not trying to spoof its MAC address.

A

Dynamic Host Configuration Protocol (DHCP) snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ guard prevents _____ from communicating network topology information on access ports. This protects against misconfiguration or a possible malicious attack.

A

Bridge Protocol Data Unit (BPDU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An _____ can connect multiple subnets to reduce the number of active ports.

A

aggregation switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____ is part of a Security Information and Event Manager (SIEM). It captures and examines logged events to alert administrators of potential threats on a network.

A

correlation engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ gather information to determine if the data being passed is malicious or not.

A

Sensors

The Internet facing sensor will see all traffic and determine its Intent. The sensor behind the firewall will only see filtered traffic. The sensors send findings to the NIDS console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An ____ is a private company zone established to allow employees the ability to share content and communicate more effectively.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An _____ is a zone created to allow authorized users access to company assets, separate from the intranet.

A

extranet

17
Q

The _____ is an all-in-one security appliance that combines the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, Data Loss Prevention, content filtering, and many more.

A

Unified Threat Management (UTM)

18
Q

_____ Virtual Private Network (VPN) uses modern web browsers to access and manage a desktop with relatively little lag. This is also known as a clientless remote desktop gateway.

A

Hypertext Markup Language 5 (HTML5)

19
Q

_____ is used with IP Security (IPSec) to provide a VPN tunnel. This will require installing a VPN agent at the client.

A

Layer 2 Tunneling Protocol (L2TP)

20
Q

An _____ can be used to restrict communications between two network segments or two switches connected to a router.

A

access control list (ACL)

21
Q

_____ describes the network and platform configurations that support cloud and other Internet services where most traffic is actually between servers within the data center.

A

East-west traffic

22
Q

_____ is Cisco’s proprietary service to providing a load-balanced service with a VIP (Virtual IP)

A

Gateway Load Balancing Protocol (GLBP)

The infrastructure is Cisco-based

23
Q

_____ is another commonly used network protocol that works in the same way as GLBP.

A

Common Address Redundancy Protocol (CARP)

24
Q

A _____ examines the data and makes rule-based decisions about whether the request should be forwarded or refused.

A

proxy

25
Q

_____ translates public IP addresses to private and vice versa. By using the ___ protocol on the firewall, a company can hide assets from the public internet.

A

Network Addressing Protocol (NAT)

26
Q

A _____ is an area of a network that is designed specifically for public users to access.

A

demilitarized zone (DMZ)

27
Q

A _____ is used to monitor network traffic. It forwards a copy of each packet from one switch port to another.

A

port mirror

28
Q

_____ can publish specific applications from the corporate network to the Internet by listening for specific client requests. This will ensure other intranet services are not exposed

A

Reverse proxies