Best practices in Network Design
11 important questions on Best practices in Network Design
How is the network separated in the three layer hierarchical model?
What is the function of the access layer in the classic three layer hierarchical model?
What is the function of the distribution layer in the classic three layer hierarchical model?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is the function of the core layer in the classic three layer hierarchical model?
With what technique, besides separation by tasks performed through the network devices, can we also separate tasks?
Give a synonym for trust boundary, and the apposite of a trust boundary.
Give 2 basic DMZs and their pros/cons.
Give the 4 DMZ designs presented in the book What were the catches?
2) Compromised webserver would allow attacks on the application server.
3) Becomes very complex, misconfiguration can have severe consequences.
What 2 elements are necessary for a high-availability design?
- A set of devices identical from the perspective of the service.
- An infrastructure that monitors the health of devices and can direct traffic to a live server. (load balancers)
What 2 techniques can be used to keep stickyness with load balancers?
2) There must be some identifier that tells the load balancer where to send the connection (i.e. url)
What 3 techniques were presented to combine a load balancer and SSL/TLS encryption? What were the disadvantages of 1?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding