Network security 0.0 / 5 ? AllITFunNone Created by: lucydosramosCreated on: 01-11-18 14:29 What are the 4 different zones of a network? Internet, intranet, extranet and Perimeter network 1 of 24 What protocol suite does the internet use? TCP/IP 2 of 24 Why is the internet the most dangerous zone? Not controlled 3 of 24 What is an intranet? Private computer network/single website, share data with employees 4 of 24 Why is user authentication necessary on an intranet? Keeps the general public out 5 of 24 What is different about an extranet from an intranet? Extranet is extended to users outside a company 6 of 24 User authentication is not necessary for an extranet, true or false? False 7 of 24 What is a perimeter network? A section of the corporate network that allows access to users 8 of 24 Why is it called a perimeter network? Usually on the edge of a LAN 9 of 24 What servers are included in perimeter networks? Web servers, mail servers and remote access servers 10 of 24 What are the 2 most common DMZ configurations? Back to back configurations and 3-leg perimeter configuration 11 of 24 What is a VPN? A connection between 2 or more computers or devices that are not on the same private network 12 of 24 Name 2 popular VPN protocols PPTP, L2TP, SSTP or IKEv2 13 of 24 What are firewalls used for? To protect a network from malicious attack and unwanted intrusion 14 of 24 What are the 4 main ways to block traffic? Packet filtering, Stateful filtering, content filtering and application layer filtering 15 of 24 What does a proxy server act as? An intermediary between a LAN and the Internet 16 of 24 What does a proxy server do? Evaluates requests from clients, forwards them to the appropriate server 17 of 24 What does caching proxy attempt to do? Serve client requests without contacting the remote server 18 of 24 What is the most common caching proxy? HTTP 19 of 24 How does an IP proxy secure a network? By keeping machines behind it anonymous through the use of NAT 20 of 24 At what layer of the OSI model is Internet content filter applied? Application layer 21 of 24 What does the internet content filter do? Filters out various types of internet activities 22 of 24 What is a virtual LAN? Group of hosts with common set of requirements 23 of 24 How do you create a VLAN? Managed switch 24 of 24
Comments
No comments have yet been made