Secure Network Architecture
VIDEO LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=RAOM2SRPSRU
Why is normalizing log data important in a centralized logging setup?
Nice work! Logs from various systems may be formatted differently. Normalizing logs is the practice of reformatting the logs into a common format, allowing for easier storage and lookups in a centralized logging system.
What type of attacks does a flood guard protect against? Check all that apply.
You got it! A flood guard protects against attacks that overwhelm networking resources, like DoS attacks and SYN floods.
You got it! A flood guard protects against attacks that overwhelm networking resources, like DoS attacks and SYN floods.
What does DHCP Snooping protect against?
Good job! DHCP snooping is designed to guard against rogue DHCP attacks. The switch can be configured to transmit DHCP responses only when they come from the DHCP server's port.
What does Dynamic ARP Inspection protect against?
That's exactly right! Dynamic ARP inspection protects against ARP poisoning attacks by watching for ARP packets. If an ARP packet doesn't match the table of MAC address and IP address mappings generated by DHCP snooping, the packet will be dropped as invalid or malicious.
What does IP Source Guard protect against?
Right on! IP Source Guard prevents an attacker from spoofing an IP address on the network. It does this by matching assigned IP addresses to switch ports, and dropping unauthorized traffic.
What does EAP-TLS use for mutual authentication of both the server and the client?
Yep! The client and server both present digital certificates, which allows both sides to authenticate the other, providing mutual authentication.
Why is it recommended to use both network-based and host-based firewalls? Check all that apply.
Nice job! Using both network- and host-based firewalls provides protection from external and internal threats. This also protects hosts that move between trusted and untrusted networks, like mobile devices and laptops.
Nice job! Using both network- and host-based firewalls provides protection from external and internal threats. This also protects hosts that move between trusted and untrusted networks, like mobile devices and laptops.
Comments