Network security

?
What are the 4 different zones of a network?
Internet, intranet, extranet and Perimeter network
1 of 24
What protocol suite does the internet use?
TCP/IP
2 of 24
Why is the internet the most dangerous zone?
Not controlled
3 of 24
What is an intranet?
Private computer network/single website, share data with employees
4 of 24
Why is user authentication necessary on an intranet?
Keeps the general public out
5 of 24
What is different about an extranet from an intranet?
Extranet is extended to users outside a company
6 of 24
User authentication is not necessary for an extranet, true or false?
False
7 of 24
What is a perimeter network?
A section of the corporate network that allows access to users
8 of 24
Why is it called a perimeter network?
Usually on the edge of a LAN
9 of 24
What servers are included in perimeter networks?
Web servers, mail servers and remote access servers
10 of 24
What are the 2 most common DMZ configurations?
Back to back configurations and 3-leg perimeter configuration
11 of 24
What is a VPN?
A connection between 2 or more computers or devices that are not on the same private network
12 of 24
Name 2 popular VPN protocols
PPTP, L2TP, SSTP or IKEv2
13 of 24
What are firewalls used for?
To protect a network from malicious attack and unwanted intrusion
14 of 24
What are the 4 main ways to block traffic?
Packet filtering, Stateful filtering, content filtering and application layer filtering
15 of 24
What does a proxy server act as?
An intermediary between a LAN and the Internet
16 of 24
What does a proxy server do?
Evaluates requests from clients, forwards them to the appropriate server
17 of 24
What does caching proxy attempt to do?
Serve client requests without contacting the remote server
18 of 24
What is the most common caching proxy?
HTTP
19 of 24
How does an IP proxy secure a network?
By keeping machines behind it anonymous through the use of NAT
20 of 24
At what layer of the OSI model is Internet content filter applied?
Application layer
21 of 24
What does the internet content filter do?
Filters out various types of internet activities
22 of 24
What is a virtual LAN?
Group of hosts with common set of requirements
23 of 24
How do you create a VLAN?
Managed switch
24 of 24

Other cards in this set

Card 2

Front

What protocol suite does the internet use?

Back

TCP/IP

Card 3

Front

Why is the internet the most dangerous zone?

Back

Preview of the front of card 3

Card 4

Front

What is an intranet?

Back

Preview of the front of card 4

Card 5

Front

Why is user authentication necessary on an intranet?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all IT resources »