Networking Security
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a type of device that expands on the capabilities of a traditional firewall?

  • CSU/DSU
  • RADIUS server
  • NGFW (correct)
  • Proxy server
  • What feature enables an IDS to monitor all traffic on a switched network?

  • Trunking
  • Port mirroring (correct)
  • Service-dependent filtering
  • Stateful packet inspection
  • Which of the following is not a SAN protocol?

  • VoIP (correct)
  • iSCSI
  • FCoE
  • Fibre Channel
  • What do iSCSI initiators use to locate iSCSI targets on the network?

    <p>iSNS</p> Signup and view all the answers

    What is the best device to install between the multifunction device and the cable modem to prevent intrusions?

    <p>Intrusion prevention system (IPS)</p> Signup and view all the answers

    Which of the following statements about hubs and switches is true?

    <p>All of the devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain.</p> Signup and view all the answers

    What type of device is a load balancer?

    <p>Gateway</p> Signup and view all the answers

    Which of the following devices perform essentially the same function?

    <p>Hubs and bridges</p> Signup and view all the answers

    What is a proxy server used for?

    <p>To provide Internet access and security against outside intrusions</p> Signup and view all the answers

    What type of switch immediately forwards frames after looking at only the destination address?

    <p>Cut-through switch</p> Signup and view all the answers

    Which of the following devices can monitor network traffic for abnormal or malicious activity?

    <p>IDS</p> Signup and view all the answers

    Which of the following SAN protocols can share a network medium with standard LAN traffic?

    <p>iSCSI</p> Signup and view all the answers

    What is a capability that only a firewall capable of stateful packet inspection can do?

    <p>Scan Transport layer header fields for evidence of SYN floods</p> Signup and view all the answers

    Which of the following methods do intrusion detection systems (IDSs) typically use to analyze incoming network traffic?

    <p>Anomaly-based detection and signature-based detection</p> Signup and view all the answers

    What is another term for a multiport bridge?

    <p>Switch</p> Signup and view all the answers

    What is the primary function of a personal firewall?

    <p>To block traffic entering a computer</p> Signup and view all the answers

    What is the primary function of a port scanner?

    <p>To scan traffic entering a network for open ports</p> Signup and view all the answers

    At which layer of the OSI model do routers operate?

    <p>Network layer</p> Signup and view all the answers

    What type of system is frequently used to collect information from intrusion detection systems (IDSs)?

    <p>SIEM</p> Signup and view all the answers

    What is the primary reason for splitting a large, switched Ethernet LAN into two LANs by adding a router?

    <p>To reduce the amount of broadcast traffic on each LAN</p> Signup and view all the answers

    What type of addressing do bridges and switches use to forward frames?

    <p>Media access control (MAC) addressing</p> Signup and view all the answers

    How do switches forward packets?

    <p>Based on their hardware addresses</p> Signup and view all the answers

    What is a characteristic of a router?

    <p>It can communicate with other routers and share information</p> Signup and view all the answers

    What is a benefit of adding a router to a large, switched Ethernet LAN?

    <p>It reduces the amount of broadcast traffic on each LAN</p> Signup and view all the answers

    What is a fundamental requirement for bridges and switches on a local area network (LAN)?

    <p>Supporting the Network layer protocol</p> Signup and view all the answers

    What defines a separate broadcast domain in a network device?

    <p>Each port on a bridge or switch</p> Signup and view all the answers

    What is a traditional switch also known as?

    <p>Multiport bridge</p> Signup and view all the answers

    Why do layer 2 switches improve the performance of an Ethernet LAN compared to hubs?

    <p>They reduce the number of collisions on the network</p> Signup and view all the answers

    What is true about routers?

    <p>They build their internal tables based on destination IP addresses</p> Signup and view all the answers

    What is not a characteristic of routers?

    <p>They store and maintain route information in a local database</p> Signup and view all the answers

    What is a function of routers?

    <p>Forwarding frames based on destination IP addresses</p> Signup and view all the answers

    What is a capability of software routers?

    <p>Connecting two or more networks with dissimilar Data link layer protocols and media</p> Signup and view all the answers

    What is the term for the client that accesses an iSCSI device on a storage area network?

    <p>Initiator</p> Signup and view all the answers

    Which protocol is not included in an iSCSI packet on a storage area network (SAN)?

    <p>None of the above</p> Signup and view all the answers

    Which protocol standard defines a layered implementation that corresponds to the layers of the OSI model?

    <p>PPP</p> Signup and view all the answers

    Which of the following protocols are included in an FCoE packet?

    <p>Ethernet</p> Signup and view all the answers

    What is the primary objective of Ralph's proposed Internet access solution?

    <p>To provide access to web and email services</p> Signup and view all the answers

    What is the role of the proxy servers in Ralph's proposed solution?

    <p>To monitor and regulate users' access to the Internet</p> Signup and view all the answers

    Why does Ralph propose using private IP addresses on the client computers?

    <p>To avoid manual configuration of IP addresses</p> Signup and view all the answers

    What is the benefit of using proxy servers with public, registered IP addresses?

    <p>To keep client computers safe from unauthorized users</p> Signup and view all the answers

    Study Notes

    Network Security Devices

    • An intrusion prevention system (IPS) can be installed between a multifunction device and a cable modem to prevent unauthorized access.
    • A personal firewall can be installed on each computer to protect it from external threats.

    Hubs and Switches

    • Hubs operate only at the Physical layer, whereas switches operate at the Data link layer.
    • All devices connected to a hub are part of a single collision domain, whereas each device connected to a switch has its own collision domain.
    • There are switches available with Network layer functionality, but there are no hubs with that capability.
    • Switches do not create a separate broadcast domain for each connected device; instead, they create a single broadcast domain for all connected devices.

    Switch Types

    • Cut-through switches immediately forward frames after looking at only the destination address.
    • Source route switches are a type of switch that is not commonly used.
    • Store-and-forward switches receive the entire frame before forwarding it.

    Firewalls

    • Firewalls capable of stateful packet inspection can filter traffic based on port numbers, block traffic destined for specific IP addresses, and scan Transport layer header fields for evidence of SYN floods.
    • Firewalls can block all TCP traffic from entering a network.

    Intrusion Detection Systems (IDSs)

    • IDSs use anomaly-based detection, behavior-based detection, and signature-based detection to analyze incoming network traffic.
    • IDSs can also use statistic-based detection, but it is not a common method.

    Switches and Routers

    • Routers operate at the Network layer, whereas switches operate at the Data link layer.
    • All devices connected to a switch are part of a single broadcast domain, whereas the networks connected to a router form separate broadcast domains.
    • Routers can communicate with each other and share information, but switches cannot.
    • Routers forward packets based on their IP addresses, whereas switches forward packets based on their hardware addresses.

    SIEM Systems

    • SIEM (Security Information and Event Management) systems are used to collect information from IDSs.

    Traffic Congestion

    • Splitting a large, switched Ethernet LAN into two LANs by adding a router can help to alleviate traffic congestion and improve performance by reducing the amount of broadcast traffic on each LAN.

    Bridges and Switches

    • Bridges and switches are Data link layer devices that use media access control (MAC) addresses to forward frames.
    • Bridges and switches build their internal tables based on destination addresses and forward packets based on source addresses.

    Traditional Switches

    • A traditional switch is a multiport bridge that forwards packets based on MAC addresses.

    Layer 2 Switches

    • Layer 2 switches improve network performance by reducing the number of collisions on the network.
    • Layer 2 switches do not forward broadcast transmissions, which improves network performance.

    Routers

    • Routers are Network layer devices that use IP addresses to forward frames.
    • Routers can connect two or more networks with dissimilar Data link layer protocols and media.
    • Routers can learn and populate their routing tables through static and dynamic routing.
    • Each port on a router defines a separate broadcast domain.

    Load Balancers

    • A load balancer is a type of device that expands on the capabilities of traditional routers and firewalls.

    Next-Generation Firewalls (NGFWs)

    • NGFWs are devices that expand on the capabilities of traditional firewalls by adding features like deep packet inspection (DPI) and an intrusion prevention system (IPS).

    Proxy Servers

    • Proxy servers can provide security against outside intrusion by using a public IP address, while the client computers use private addresses.
    • Proxy servers can be used to monitor and regulate users' access to the Internet.

    Intrusion Detection Systems (IDSs)

    • IDSs can be used to monitor a network for abnormal or malicious traffic.
    • IDSs can monitor traffic on a switched network using port mirroring.

    Storage Area Networks (SANs)

    • iSCSI, Fibre Channel, and FCoE are protocols used in SANs.
    • iSCSI initiators use iSNS (Internet Storage Name Service) to locate iSCSI targets on the network.
    • Fibre Channel and FCoE are not capable of sharing a network medium with standard LAN traffic.

    iSCSI Packets

    • iSCSI packets include Ethernet, IP, and TCP protocols.

    Fibre Channel Packets

    • Fibre Channel packets do not include Ethernet, IP, or TCP protocols.

    FCoE Packets

    • FCoE packets include Ethernet and Fibre Channel protocols.

    Private Internetworks

    • Private internetworks can use private IP addresses and proxy servers with public, registered IP addresses to connect to the Internet.
    • This solution can provide access to web and email services while keeping client computers safe from unauthorized users on the Internet.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz assesses knowledge of computer networking security measures such as intrusion prevention systems, firewalls, and detection systems. It also tests understanding of network devices like hubs and switches.

    More Like This

    Computer Networks and Cybersecurity
    18 questions
    IT Security Threats and Vulnerabilities
    16 questions
    Computer Security Risks
    11 questions
    Use Quizgecko on...
    Browser
    Browser