Podcast
Questions and Answers
What is a type of device that expands on the capabilities of a traditional firewall?
What is a type of device that expands on the capabilities of a traditional firewall?
What feature enables an IDS to monitor all traffic on a switched network?
What feature enables an IDS to monitor all traffic on a switched network?
Which of the following is not a SAN protocol?
Which of the following is not a SAN protocol?
What do iSCSI initiators use to locate iSCSI targets on the network?
What do iSCSI initiators use to locate iSCSI targets on the network?
Signup and view all the answers
What is the best device to install between the multifunction device and the cable modem to prevent intrusions?
What is the best device to install between the multifunction device and the cable modem to prevent intrusions?
Signup and view all the answers
Which of the following statements about hubs and switches is true?
Which of the following statements about hubs and switches is true?
Signup and view all the answers
What type of device is a load balancer?
What type of device is a load balancer?
Signup and view all the answers
Which of the following devices perform essentially the same function?
Which of the following devices perform essentially the same function?
Signup and view all the answers
What is a proxy server used for?
What is a proxy server used for?
Signup and view all the answers
What type of switch immediately forwards frames after looking at only the destination address?
What type of switch immediately forwards frames after looking at only the destination address?
Signup and view all the answers
Which of the following devices can monitor network traffic for abnormal or malicious activity?
Which of the following devices can monitor network traffic for abnormal or malicious activity?
Signup and view all the answers
Which of the following SAN protocols can share a network medium with standard LAN traffic?
Which of the following SAN protocols can share a network medium with standard LAN traffic?
Signup and view all the answers
What is a capability that only a firewall capable of stateful packet inspection can do?
What is a capability that only a firewall capable of stateful packet inspection can do?
Signup and view all the answers
Which of the following methods do intrusion detection systems (IDSs) typically use to analyze incoming network traffic?
Which of the following methods do intrusion detection systems (IDSs) typically use to analyze incoming network traffic?
Signup and view all the answers
What is another term for a multiport bridge?
What is another term for a multiport bridge?
Signup and view all the answers
What is the primary function of a personal firewall?
What is the primary function of a personal firewall?
Signup and view all the answers
What is the primary function of a port scanner?
What is the primary function of a port scanner?
Signup and view all the answers
At which layer of the OSI model do routers operate?
At which layer of the OSI model do routers operate?
Signup and view all the answers
What type of system is frequently used to collect information from intrusion detection systems (IDSs)?
What type of system is frequently used to collect information from intrusion detection systems (IDSs)?
Signup and view all the answers
What is the primary reason for splitting a large, switched Ethernet LAN into two LANs by adding a router?
What is the primary reason for splitting a large, switched Ethernet LAN into two LANs by adding a router?
Signup and view all the answers
What type of addressing do bridges and switches use to forward frames?
What type of addressing do bridges and switches use to forward frames?
Signup and view all the answers
How do switches forward packets?
How do switches forward packets?
Signup and view all the answers
What is a characteristic of a router?
What is a characteristic of a router?
Signup and view all the answers
What is a benefit of adding a router to a large, switched Ethernet LAN?
What is a benefit of adding a router to a large, switched Ethernet LAN?
Signup and view all the answers
What is a fundamental requirement for bridges and switches on a local area network (LAN)?
What is a fundamental requirement for bridges and switches on a local area network (LAN)?
Signup and view all the answers
What defines a separate broadcast domain in a network device?
What defines a separate broadcast domain in a network device?
Signup and view all the answers
What is a traditional switch also known as?
What is a traditional switch also known as?
Signup and view all the answers
Why do layer 2 switches improve the performance of an Ethernet LAN compared to hubs?
Why do layer 2 switches improve the performance of an Ethernet LAN compared to hubs?
Signup and view all the answers
What is true about routers?
What is true about routers?
Signup and view all the answers
What is not a characteristic of routers?
What is not a characteristic of routers?
Signup and view all the answers
What is a function of routers?
What is a function of routers?
Signup and view all the answers
What is a capability of software routers?
What is a capability of software routers?
Signup and view all the answers
What is the term for the client that accesses an iSCSI device on a storage area network?
What is the term for the client that accesses an iSCSI device on a storage area network?
Signup and view all the answers
Which protocol is not included in an iSCSI packet on a storage area network (SAN)?
Which protocol is not included in an iSCSI packet on a storage area network (SAN)?
Signup and view all the answers
Which protocol standard defines a layered implementation that corresponds to the layers of the OSI model?
Which protocol standard defines a layered implementation that corresponds to the layers of the OSI model?
Signup and view all the answers
Which of the following protocols are included in an FCoE packet?
Which of the following protocols are included in an FCoE packet?
Signup and view all the answers
What is the primary objective of Ralph's proposed Internet access solution?
What is the primary objective of Ralph's proposed Internet access solution?
Signup and view all the answers
What is the role of the proxy servers in Ralph's proposed solution?
What is the role of the proxy servers in Ralph's proposed solution?
Signup and view all the answers
Why does Ralph propose using private IP addresses on the client computers?
Why does Ralph propose using private IP addresses on the client computers?
Signup and view all the answers
What is the benefit of using proxy servers with public, registered IP addresses?
What is the benefit of using proxy servers with public, registered IP addresses?
Signup and view all the answers
Study Notes
Network Security Devices
- An intrusion prevention system (IPS) can be installed between a multifunction device and a cable modem to prevent unauthorized access.
- A personal firewall can be installed on each computer to protect it from external threats.
Hubs and Switches
- Hubs operate only at the Physical layer, whereas switches operate at the Data link layer.
- All devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain.
- There are switches available with Network layer functionality, but there are no hubs with that capability.
- Switches do not create a separate broadcast domain for each connected device; instead, they create a single broadcast domain for all connected devices.
Switch Types
- Cut-through switches immediately forward frames after looking at only the destination address.
- Source route switches are a type of switch that is not commonly used.
- Store-and-forward switches receive the entire frame before forwarding it.
Firewalls
- Firewalls capable of stateful packet inspection can filter traffic based on port numbers, block traffic destined for specific IP addresses, and scan Transport layer header fields for evidence of SYN floods.
- Firewalls can block all TCP traffic from entering a network.
Intrusion Detection Systems (IDSs)
- IDSs use anomaly-based detection, behavior-based detection, and signature-based detection to analyze incoming network traffic.
- IDSs can also use statistic-based detection, but it is not a common method.
Switches and Routers
- Routers operate at the Network layer, whereas switches operate at the Data link layer.
- All devices connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains.
- Routers can communicate with each other and share information, but switches cannot.
- Routers forward packets based on their IP addresses, whereas switches forward packets based on their hardware addresses.
SIEM Systems
- SIEM (Security Information and Event Management) systems are used to collect information from IDSs.
Traffic Congestion
- Splitting a large, switched Ethernet LAN into two LANs by adding a router can help to alleviate traffic congestion and improve performance by reducing the amount of broadcast traffic on each LAN.
Bridges and Switches
- Bridges and switches are Data link layer devices that use media access control (MAC) addresses to forward frames.
- Bridges and switches build their internal tables based on destination addresses and forward packets based on source addresses.
Traditional Switches
- A traditional switch is a multiport bridge that forwards packets based on MAC addresses.
Layer 2 Switches
- Layer 2 switches improve network performance by reducing the number of collisions on the network.
- Layer 2 switches do not forward broadcast transmissions, which improves network performance.
Routers
- Routers are Network layer devices that use IP addresses to forward frames.
- Routers can connect two or more networks with dissimilar Data link layer protocols and media.
- Routers can learn and populate their routing tables through static and dynamic routing.
- Each port on a router defines a separate broadcast domain.
Load Balancers
- A load balancer is a type of device that expands on the capabilities of traditional routers and firewalls.
Next-Generation Firewalls (NGFWs)
- NGFWs are devices that expand on the capabilities of traditional firewalls by adding features like deep packet inspection (DPI) and an intrusion prevention system (IPS).
Proxy Servers
- Proxy servers can provide security against outside intrusion by using a public IP address, while the client computers use private addresses.
- Proxy servers can be used to monitor and regulate users' access to the Internet.
Intrusion Detection Systems (IDSs)
- IDSs can be used to monitor a network for abnormal or malicious traffic.
- IDSs can monitor traffic on a switched network using port mirroring.
Storage Area Networks (SANs)
- iSCSI, Fibre Channel, and FCoE are protocols used in SANs.
- iSCSI initiators use iSNS (Internet Storage Name Service) to locate iSCSI targets on the network.
- Fibre Channel and FCoE are not capable of sharing a network medium with standard LAN traffic.
iSCSI Packets
- iSCSI packets include Ethernet, IP, and TCP protocols.
Fibre Channel Packets
- Fibre Channel packets do not include Ethernet, IP, or TCP protocols.
FCoE Packets
- FCoE packets include Ethernet and Fibre Channel protocols.
Private Internetworks
- Private internetworks can use private IP addresses and proxy servers with public, registered IP addresses to connect to the Internet.
- This solution can provide access to web and email services while keeping client computers safe from unauthorized users on the Internet.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz assesses knowledge of computer networking security measures such as intrusion prevention systems, firewalls, and detection systems. It also tests understanding of network devices like hubs and switches.