secure network designs Flashcards
A network-based firewall analyzes packets at the layer _ or _____ of the OSI
2
data link layer
An application firewall analyzes packets at layer _ or the _____.
7
application layer
_____ will ensure a proper failure capability. Requests will continually flow through one load balancer and through the secondary if the primary fails.
active/passive topology
Switches that support quality of service uses the _____ header to prioritize frames. This will improve video conferences and make efficient use of the overall network bandwidth.
802.1p
_____ is a means of remote management of a system; a term commonly used when managing network devices.
Out-of-band (OOB) management
The _____ is the code and metrics that determine which node is selected for processing each incoming request
scheduling algorithm
An _____ configuration sends all requests to one node while the other node is on standby. The secondary node takes over services when the primary node loses connectivity or goes offline.
active/passive
_____ allow an application-layer load balancer to keep clients connected to a session. This is achieved with a cookie at the client.
Persistence settings
_____ is principally designed to prevent broadcast storms. These storms occur when a bridged network contains a loop and broadcast traffic is amplified by the other switches. This can disrupt the network services.
Spanning Tree Protocol (STP)
_____ is a network setting that inspects traffic on access ports to ensure that a host is not trying to spoof its MAC address.
Dynamic Host Configuration Protocol (DHCP) snooping
A _____ guard prevents _____ from communicating network topology information on access ports. This protects against misconfiguration or a possible malicious attack.
Bridge Protocol Data Unit (BPDU)
An _____ can connect multiple subnets to reduce the number of active ports.
aggregation switch
A _____ is part of a Security Information and Event Manager (SIEM). It captures and examines logged events to alert administrators of potential threats on a network.
correlation engine
_____ gather information to determine if the data being passed is malicious or not.
Sensors
The Internet facing sensor will see all traffic and determine its Intent. The sensor behind the firewall will only see filtered traffic. The sensors send findings to the NIDS console.
An ____ is a private company zone established to allow employees the ability to share content and communicate more effectively.
intranet