24 Questions
What type of statistical information is used to detect possible threats and block intruders?
Connection table data
What does the A/B/C Balance represent in the Tier Statistics tab?
Balance between XLRs
What does a value in parentheses () represent in the Tier 1 statistics?
High-level watermark
How can the tier statistics be cleared?
Using the CLI command clear np tier-stats
Which factor reduces the value of both Utilization and Ratio to next tier?
Inspection bypass rules
What does a value in brackets [] represent in the Tier 1 statistics?
Low-level watermark
What is the function of Tier 1 in the context of traffic handling?
Handling inspection bypass and jumbo packet shunting
What does Utilization display in the Tier Statistics tab?
% of traffic to the next tier
What can you do with the polling intervals?
Change them as needed
What is indicated by red and yellow counts in frame size distribution?
Small packet counts
What does an abundance of broadcast show up as in the lower chart?
Orange
When reviewing traffic stats, what is typically seen unless there are too many small UDP packets or fragments?
TCP
Where do you access the device from to view the Management Information page?
SMS
What can you view and update using the Management Information page in the Device Configuration wizard?
General information about the device
What does it indicate when Slot 1 Segment 3A and 3B show that packets are being blocked?
Packets are being dropped
What should you check for when reviewing traffic stats?
Broadcast count
What type of events should be changed from B+ N to Block for performance optimization?
Low priority events
Where is the state of a connection maintained in the system?
Connection Table
What is the purpose of the Header Processing stage?
To check fixed header fields and packet formatting
In which stage are packets/flows analyzed using protocol decoders and regular expression matching?
Content Matching
What are the possible outcomes of the Threat Verification test?
Benign or Filter Match for flow
Where does the system perform rate limiting of traffic based on policy?
Flow Control
What does the system do if any previous checks imply suspicion?
Drops the packet immediately or passes it on for further verification
Which stage is responsible for maintaining Blocked and Rate-Limited Streams?
Connection Table
Test your knowledge of network traffic pipeline with this quiz. Learn about the checks involved in the pipeline such as Connection Table, Advanced DDoS functionality, Blocked and Rate-Limited Streams, and Header Processing.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free