📘 Chapter 4 – Network Security Devices, Design & Technology

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Q: How can network security be achieved?

A: By using security features in standard network devices and dedicated security hardware.

2
New cards

Q: Why is the OSI model important for security devices?

A: Security devices function at different OSI layers, each providing specific protections.

3
New cards

Q: What risk do improperly configured devices create?

A: They introduce vulnerabilities.

4
New cards

Q: What is a bridge?

A: A device that connects two network segments and work at the Layer 2 (Data Link).

5
New cards

Q: Why can software bridges be risky?

A: They may unintentionally expose networks.

6
New cards

Q: What is the function of a switch?

A: Intelligently forwards frames based on MAC addresses and uses MAC address table.

7
New cards

Q: Why are switches more secure than hubs?

A: They send data only to intended recipients.

8
New cards

Q: What is a MAC flooding attack?

A: Overloading a switch with fake MAC addresses.

9
New cards

Q: What defense prevents MAC flooding?

A: Flood guard (port security).

10
New cards

Q: What is the main function of a router?

A: Forward packets between networks and works at Layer 3 of OSI which is Network.

11
New cards

Q: How do routers enhance security?

A: Using Access Control Lists (ACLs).

12
New cards

Q: What is the purpose of a load balancer?

A: Distribute traffic evenly across servers.

13
New cards

Q: Two advantages of load balancing?

A:

  • Prevents server overload

  • Optimizes bandwidth

14
New cards

Q: What are Layer 4 load balancers?

A: Use Network and Transport layer data.

15
New cards

Q: What are Layer 7 load balancers?

A: Use Application layer data.

16
New cards

Q: What is a proxy server?

A: Intermediary that processes requests on behalf of users.

17
New cards

Q: What is a forward proxy?

A: Intercepts internal user requests.

18
New cards

Q: What is a reverse proxy?

A: Routes external requests to internal servers.

19
New cards

Q: What is a transparent proxy?

A: Requires no user configuration.

20
New cards

Q: Benefits of proxy servers?

A:

  • Increased speed

  • Reduced cost

  • Improved management

  • Stronger security

21
New cards

Q: What is a firewall?

A: A device that inspects and filters network traffic.

22
New cards

Q: Types of firewalls?

A:

  • Hardware firewalls

  • Software (host-based) firewalls

23
New cards

Q: Which firewall protects a single device?

A: Software firewall.

24
New cards

Q: What is stateless packet filtering?

A: Filters packets individually based on rules.

25
New cards

Q: What is stateful packet filtering?

A: Tracks active connections before allowing traffic.

26
New cards

Q: What does “Allow” mean in firewall rules?

A: Packet is permitted.

27
New cards

Q: What does “Drop” mean?

A: Packet is silently discarded.

28
New cards

Q: What does “Reject” mean?

A: Packet is blocked and sender is notified.