Tools Flashcards
Device that caches internet requests for performance improvements. Typically only HTTP and HTTPS.
Transparent proxy server.
Devices that caches internet requests for performance improvements and to analyze and filter requests based on company policies.
Non-transparent proxy server
Device that accepts requests from the internet, typically used for web servers. Acts as a load balancer by caching incoming requests from an internal web server.
Reverse proxy server
Device that accepts and forward requests for applications. Forwards those requests to the appropriate server and then replies to the requester. Often this is where the APIs are located.
Application proxy server
Single device that handles routing, firewall, IPS/IDS, proxies and other security functions.
Unified Threat Management (UTM)
Device that examines all incoming and outgoing email and attempts to reduce risks associated with email.
Mail gateway
Protocol that prevents switching loops.
Spanning Tree Protocol (STP)
Blocks flood attacks.
Flood guard
Flood attack
Layer 2 attack. DOS attack by “flooding” the l2 switch with traffic, overwhelming it.
How do you block unauthorized users from plugging devices in to unused ports.
Port security methods.
802.1x authentication
Disabling unused ports
Mac address filtering
Increase segmentation of a layer 3 subnet.
Virtual Local Area Network
How to prevent spoofing.
Address anti-spoofing are done with access control lists on firewalls. Cross-checks IP to MAC for any changes.
VTP
Vlan Trunking Protocol. Depending on switches, the VTP will allow VLANs to be automatically created on participating switches.
Spanning Port
Port on a switch that relays ALL traffic.
Port on a switch that relays ALL traffic.
Spanning Port