Best practices in Network Design

11 important questions on Best practices in Network Design

How is the network separated in the three layer hierarchical model?

ACore, distribution and access layer.

What is the function of the access layer in the classic three layer hierarchical model?

Providing connectivity to hosts and end users. Typical devices are switches and wireless access points.

What is the function of the distribution layer in the classic three layer hierarchical model?

Network traffic from access aggregators is handled. Introduces access control mechanisms and filtering.
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

What is the function of the core layer in the classic three layer hierarchical model?

It has one function: provide high-speed and resilient connectivity between a network's geographically different locations. Typically no packet manipulation or filtering.

With what technique, besides separation by tasks performed through the network devices, can we also separate tasks?

By categorzing departments, users and their traffic by the level of sensitivity and value, and in turn their threat level to fall victim to an attack. Trust domains.

Give a synonym for trust boundary, and the apposite of a trust boundary.

Choke point (connection of two areas of different trust). Air gap.

Give 2 basic DMZs and their pros/cons.

: dual-firewall DMZ is safer (misconfiguration is not a disaster), three-legged DMZ is cheaper and less complex.

Give the 4 DMZ designs presented in the book What were the catches?

1) Should the web server be compromised, the adversary could freely move about the local network and try to break into the database.
2) Compromised webserver would allow attacks on the application server.
3) Becomes very complex, misconfiguration can have severe consequences.

What 2 elements are necessary for a high-availability design?

  1. A set of devices identical from the perspective of the service.
  2. An infrastructure that monitors the health of devices and can direct traffic to a live server. (load balancers)

What 2 techniques can be used to keep stickyness with load balancers?

1) User's sessions are stored in a distributed manner, such as a backend database or synced at the application layer between hosts.
2) There must be some identifier that tells the load balancer where to send the connection (i.e. url)

What 3 techniques were presented to combine a load balancer and SSL/TLS encryption? What were the disadvantages of 1?

SSL pass-through comes with the disadvantage of unsupported user mobility. It also makes maintaining keys between certificates complex, since you need to maintain all the servers.

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo