3.3 Flashcards

Given a scenario, implement secure network designs.

1
Q

Refers to the distribution of incoming network traffic across multiple servers or resources to ensure optimal utilization, reliability, and performance.

A

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is a type of load balancing configuration where all servers in the pool actively handle incoming requests simultaneously. This setup distributes the workload evenly across all available servers, maximizing resource utilization and scalability.

A

Active/active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is a type of load balancing configuration where one server (the active server) handles incoming requests while the other server (the passive server) remains idle, serving as a backup.

A

Active/passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the algorithm or method used to determine how incoming requests are distributed among available servers.

A

Scheduling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IP address that is not associated with a specific physical server but instead is assigned to a virtual server or load balancer.

A

Virtual IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refers to the ability of a load balancer to consistently route requests from the same client to the same backend server for the duration of a session. This is important for maintaining session state or user-specific data, such as shopping carts or logged-in sessions, across multiple requests.

A

Persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Involves dividing a network into smaller, isolated segments or subnetworks to enhance security and control access to sensitive resources.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a logical segmentation of a physical network into multiple isolated broadcast domains. Allow network administrators to group devices together based on criteria such as function, department, or security requirements, regardless of their physical location.

A

Virtual local area network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a network segment that sits between an organization’s internal network (intranet) and an external network, typically the internet. Is designed to host services that need to be accessible from both the internal network and the internet.

A

Screened subnet (previously
known as demilitarized zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The flow of network traffic between servers or devices within the same network segment.

A

East-west traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a private network that extends beyond an organization’s internal network to include external parties, such as customers, partners, suppliers, or vendors.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a private network that is restricted to an organization’s internal users and resources.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a cybersecurity approach based on the principle of “never trust, always verify.” In this model, access to resources and services is not automatically granted based on a user’s location or network position but is continuously verified based on identity, device security posture, and contextual factors such as time, location, and behavior.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technology that establishes a secure and encrypted connection over a public network to enable users to access private network resources from remote locations as if they were directly connected to the private network.

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A configuration where the VPN client software on a user’s device automatically establishes and maintains a VPN connection whenever the device is connected to the internet, without requiring manual intervention from the user. This ensures that all data transmitted over the internet is encrypted and secure by default, providing continuous protection against potential security threats, even when the user is not actively using the VPN.

A

Always-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A VPN configuration where only traffic destined for the private network is routed through the VPN tunnel, while all other internet-bound traffic is sent directly to the internet without passing through the VPN. This allows users to access both private network resources and public internet services simultaneously.

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A VPN configuration where all network traffic, both private and internet-bound, is routed through the VPN tunnel to the VPN server.

A

full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allow individual users to securely connect to a private network from remote locations.

A

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Establish secure connections between two or more geographically dispersed networks. ______________ VPNs create a virtual network link between the different sites, enabling secure communication and data exchange.

A

site-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is a suite of protocols used to secure internet communications by encrypting and authenticating IP packets. Can be used to establish VPN connections to provide confidentiality, integrity, and authenticity for data transmitted over untrusted networks. It operates at the network layer (Layer 3) of the OSI model.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Are cryptographic protocols used to secure internet communications between clients and servers. ____________ VPNs use these protocols to establish encrypted connections between VPN clients and servers, typically via a web browser. They are commonly used for remote access VPNs and are well-suited for providing secure access to web-based applications and services.

A

SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Is the latest version of the HTML standard used for creating and structuring web pages. In the context of VPNs, ______________ VPNs leverage modern web technologies to provide remote access to private network resources via a web browser interface.

A

HTML5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is a tunneling protocol used to create VPN connections over the internet. Operates at the data link layer (Layer 2) of the OSI model and does not provide encryption or authentication on its own.

A

Layer 2 tunneling protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
A

Network access control (NAC)

26
Q
A

Agent

27
Q
A

Agentless

28
Q
A

Out-of-band management

29
Q
A

Port Security

30
Q
A

Broadcast storm prevention

31
Q
A

Bridge Protocol Data
Unit (BPDU) guard

32
Q
A

Loop prevention

33
Q
A

Dynamic Host Configuration
Protocol (DHCP) snooping

34
Q
A

control (MAC) filtering

35
Q
A

Jump servers

36
Q
A

Proxy servers

37
Q
A

Reverse

38
Q
A

Forward

39
Q
A

Network-based intrusion detection
system (NIDS)/network-based
intrusion prevention system (NIPS)

40
Q
A

HSM

41
Q
A

Collectors

42
Q
A

Sensors

43
Q
A

Aggregators

44
Q
A

Web application firewall (WAF)

45
Q
A

NGFW

46
Q
A

Stateful

47
Q
A

Stateless

48
Q
A

Network address
translation (NAT) gateway

48
Q
A

Unified threat management (UTM)

49
Q
A

Open-source vs. proprietary

50
Q
A

Hardware vs. software

51
Q
A

Appliance vs. host-based vs. virtual

52
Q
A

Access control list (ACL)

53
Q
A

Route security

54
Q
A

Quality of service (QoS)

55
Q
A

Implications of IPv6

56
Q
A

Port spanning/port mirroring

57
Q
A

Port taps

58
Q
A

Monitoring services

59
Q
A

File integrity monitors