Tools Flashcards

1
Q

Device that caches internet requests for performance improvements. Typically only HTTP and HTTPS.

A

Transparent proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Devices that caches internet requests for performance improvements and to analyze and filter requests based on company policies.

A

Non-transparent proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Device that accepts requests from the internet, typically used for web servers. Acts as a load balancer by caching incoming requests from an internal web server.

A

Reverse proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Device that accepts and forward requests for applications. Forwards those requests to the appropriate server and then replies to the requester. Often this is where the APIs are located.

A

Application proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Single device that handles routing, firewall, IPS/IDS, proxies and other security functions.

A

Unified Threat Management (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Device that examines all incoming and outgoing email and attempts to reduce risks associated with email.

A

Mail gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocol that prevents switching loops.

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blocks flood attacks.

A

Flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Flood attack

A

Layer 2 attack. DOS attack by “flooding” the l2 switch with traffic, overwhelming it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you block unauthorized users from plugging devices in to unused ports.

A

Port security methods.
802.1x authentication
Disabling unused ports
Mac address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Increase segmentation of a layer 3 subnet.

A

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to prevent spoofing.

A

Address anti-spoofing are done with access control lists on firewalls. Cross-checks IP to MAC for any changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VTP

A

Vlan Trunking Protocol. Depending on switches, the VTP will allow VLANs to be automatically created on participating switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spanning Port

A

Port on a switch that relays ALL traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port on a switch that relays ALL traffic.

A

Spanning Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly