SEC+ Chapter 5 Flashcards
(94 cards)
What is Network Architecture in enterprise networks?
Selection and placement of media, devices, protocols/services, and data assets.
What are the three main components of Network Architecture?
Network Infrastructure, Network Applications, and Data Assets.
Define Network Infrastructure.
Media, appliances, addressing/forwarding protocols that support basic connectivity.
What are Network Applications?
Services running on the infrastructure to support business activities, such as processing invoices or sending emails.
What are Data Assets in network architecture?
Information created, stored, and transferred as a result of business activities.
What are the Secure Design Principles in network architecture?
Confidentiality, Integrity, Availability (CIA) to ensure secure business workflows by protecting these attributes.
Describe the Email Provisioning Workflow example.
Client device accesses network via physical channel. User authenticates and is authorized to use the email application. Unauthorized users/devices are denied access. Email Mailbox Server stores data assets, accessible only by authorized clients, and must be highly available and fault-tolerant. Mail Transfer Server connects with untrusted Internet hosts, controls communication between untrusted and trusted networks, and enforces policy-based controls on data/software transfer.
What is the OSI Model used for in network infrastructure?
A framework to analyze network infrastructure and services.
What are the main Network Components?
Nodes (hosts and intermediary devices) and Links (physical media).
Differentiate between LAN and WAN.
LAN (Local Area Network) covers a single site with limited geographic area, while WAN (Wide Area Network) spans metropolitan, country-wide, or global areas.
What are Layer 2 and Layer 3 addressing and forwarding protocols?
Layer 2: MAC addresses, switches, broadcast domains. Layer 3: IP addresses, routers, separate subnets.
How do switches function at Layer 2?
Forward frames based on MAC addresses and define broadcast domains within VLANs.
What role do Wireless Access Points play in network infrastructure?
Bridge cabled networks with wireless hosts using MAC addressing similar to wired switches.
What is the primary function of routers in Layer 3?
Forward packets based on IP addresses and act as default gateways for subnets.
Compare TCP and UDP at Layer 4.
TCP: Provides reliable, connection-oriented communication. UDP: Offers unreliable, connectionless transfers.
What are Application Protocols at Layer 7 used for?
Support client/server functionality, such as HTTP and SMTP.
What is the role of DNS Servers at Layer 7?
Resolve Fully Qualified Domain Names (FQDNs) to IP addresses; they are infrastructure services, not user-level services.
What is a Star Topology in network switching?
A topology with a central switch and radiating connections to hosts, simplifying management and expansion but creating a single point of failure.
What are the three layers in a Hierarchical Network Design?
Access Layer, Distribution Layer, and Core Layer.
What are the benefits of a Hierarchical Network Design?
Improved performance, scalability, and security through network segmentation.
What is the purpose of Virtual LANs (VLANs)?
Logical segmentation of the network into separate broadcast domains for improved security and performance.
How do VLANs enhance network security?
By isolating different types of devices and controlling traffic between VLANs through routing and firewall policies.
What defines Security Zones in enterprise networks?
Segments mapped to subnets with specific security levels, including perimeter and internal zones.
What is the Perimeter in Security Zones?
The boundary between trusted (internal) and untrusted (external) zones.