CN Exam 2 Quizzes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Lesson 7 Quiz 5 - Question 1 Match the number of the missing components in the following image with their respective name/example.

1) Load Balancer 2) RESTful API 3) Flow Tables 4) Open Flow 5) SDN Controller

Most SDN applications can be grouped into one of the five categories: traffic engineering, mobility and wireless, measurement and monitoring, security and dependability, and data center networking. Classify each application into an appropriate category. Load Balancing Interference management Traffic matrix estimation tool Optimize network utilization Minimizing power consumption DoS attack mitigation

1) Traffic engineering 2) Mobility and wireless 3) Measurement and monitoring 4) Data center networking 5) Traffic engineering 6) Security and dependability

OpenFlow is used in the _____ plane, and it is an example of a ______ interface. 1) data or management 2) northbound or southbound

1) data 2) southbound The basic working of an OpenFlow switch is as follows. Each switch contains a table of packet-handling rules. Each rule has a pattern, list of actions, set of counters and a priority. When an OpenFlow switch receives a packet, it determines the highest priority matching rule, performs the action associated with it and increments the counter.

Determine which of the following can be implemented as a network application in software-defined networking. - Routing - Security enforcement - Quality of Service (QoS) enforcement - All of the above

All of the above

How does FIRE identify the most malicious networks? - Looking for suspiciously short connections within ASes in the network. - Analyzing the information given by data sources and looking for suspicious websites within an AS. - Analyzing the information given by data sources and searching for ASes with a large percentage of malicious IP addresses.

Analyzing the information given by data sources and searching for ASes with a large percentage of malicious IP addresses.

Which property of secure communication ensures that people are who they say they are when communicating over the internet? - Confidentiality - Integrity - Authentication - Availability

Authentication

Determine which type of network can implement load balancing. - Conventional netwokrs - Software-defined networks - Neither conventional nor software-defined networks - Both conventional and software defined networks

Both conventional and software defined networks

Which architecture has the strongest consistency semantics? 1) Centralized controller 2) Distributed controller with a centralized cluster of nodes 3) Distributed controller with a physically distributed set of elements

Centralized controller

Which property of secure communication is protected by encrypting the messages exchanged?

Confidentiality

What are the two operations in the P4 forwarding model? 1) Match, Act 2) Configure, Forward 3) Parse, Populate 4) Configure, Populate

Configure, Populate

SDN controllers operate on the _____________ plane.

Control

In order to stop a prefix or AS-Path announcement attack, we need access to the ___________________, such as IP prefixes and AS-paths. - Control plane data - Data plane data

Control plane data

The P4 language is used to program the _______________ plane. 1) Management 2) Control 3) Data

Data

In attacks where network traffic is dropped, manipulated or impersonated, the data accessed is located at the ___________________. - Control Plane - Data Plane

Data Plane

Determine which plane executes a network policy. - Data plane - Control plane - Management plane - All planes

Data plane

SDN-controlled switches operate on the: 1) Data Plane 2) Control Plane

Data plane

The southbound interfaces separate the... 1) Management plane and control plane 2) Management plane and data plane 3) Data plane and control plane

Data plane and control plane

The management plane ___________ a network policy. 1) defines 2) enforces 3) executes 4) ignores

Defines

ASwatch relies on the premise that "bulletproof" ASes have ______________ interconnection patterns and overall different ___________ plane behavior from most legitimate networks. - Similar, data - Similar, control - Distinct, data - Distinct, control

Distinct, control

Which architecture provides the best throughput? 1) Centralized controller 2) Distributed controller with a centralized cluster of nodes 3) Distributed controller with a physically distributed set of elements

Distributed controller with a centralized cluster of nodes

Which architecture provides the highest level of fault tolerance? 1) Centralized controller 2) Distributed controller with a centralized cluster of nodes 3) Distributed controller with a physically distributed set of elements

Distributed controller with a physically distributed set of elements

The control plane ___________ a network policy. 1) defines 2) enforces 3) executes 4) ignores

Enforces

Which type of message would be sent by an OpenFlow device to the network OS in when it receives new routing information? 1) Event based message 2) Flow statistics 3) Packet message 4) None of the above

Event based message

The data plane ___________ a network policy. 1) defines 2) enforces 3) executes 4) ignores

Executes

A distributed controller can only be used in large networks.

False

ASwatch uses information exclusively from the data plane to infer network reputation.

False

Attackers tend to keep the uptime of domains used for malicious purposes as short as possible in order to avoid being detected.

False

In SDN networks forwarding rules of traffic still have to be based on IP destination and cannot be based on other metrics, packet header info etc.

False

In SDN networks, the SDN controller is responsible for the forwarding of traffic.

False

In SDN networks, the controller needs to be implemented over a centralized server.

False

In a software defined networking, every device (switch, router, middlebox, etc.) must be able to make decisions in the forwarding process.

False

In order to achieve fault tolerance, whenever there is a failure of an ONOS instance, a master is chosen randomly for each of the switches that were controller by the failed instance.

False

In the SDN approach, the SDN controller is physically located at each router that is present in a network.

False

Legitimate networks may let malicious content be up for weeks to more than a year.

False

Load balancing is only possible with software defined networking.

False

Middleboxes can only be used in conventional networks.

False

One of the downfalls of OpenFlow when it was first created was that it was hard to deploy and scale it easily.

False

Prefix deaggregation and mitigation with Multiple Origin AS (MOAS) are independent from ARTEMIS.

False

SDN controllers that are implemented by centralized servers are more likely to achieve fault tolerance, high availability and efficiency.

False

The P4 language is being developed as a replacement for OpenFlow.

False

The Southbound interfaces are the separating medium between the Network-control Applications and the Control plane functionality.

False

The networking operating system (NOS) is a part of the data plane.

False

The physical devices in an SDN network have embedded intelligence and control required to perform forwarding tasks.

False

When a packet arrives in an OpenFlow device and it does not match any of the rules in one of the tables, that packet is always dropped.

False

The P4 programming language can also be used with a conventional network paradigm.

False P4 is a high-level programming language to configure switches which works in conjunction with SDN control protocols.

Having the software implementations for SDNs controllers increasingly open and publicly available makes it hard to control, since any person could modify the software easily.

False software implementations are also increasingly open and publicly available, which speeds up innovation in the field

The purpose of the creation of the P4 language was to offer programmability on the control plane.

False, Programming the Data Plane

A REST interface is an example of a southbound API.

False, REST interface is an example of a northbound API.

In an SDN Architecture, the northbound interface keeps track of information about the state of the hosts, links, switches and other controlled elements in the network, as well as copies of the flow tables of the switches.

False, This layer is also known as the controller's "northbound" interface using which the SDN controller interacts with network-control applications.

ONOS is an example of a centralized controller platform.

False, a distributed SDN control platform

The main reason why SDNs were created was because of the increase of internet users.

False, arose as part of the process to make computer networks more programmable

One of the main differences between the Active Networks phase and the separation of the Control and Data plane phase is that the former is focused on network-wide visibility and control and the latter is focused on device-level configurations.

False, differences from active networking phase: It focused on spurring innovation by and for network administrators rather than end users and researchers. It emphasized programmability in the control domain rather than the data domain. It worked towards network-wide visibility and control rather than device-level configurations.

Which type of message sent by an OpenFlow device to the network OS allows for quality of service (QoS) policies to be implemented? 1) Event based message 2) Flow statistics 3) Packet message 4) None of the above

Flow statistics

How does ONOS handle faults? 1) ONOS is a centralized controller and therefore not fault tolerant. 2) If an ONOS instance fails, its switches must be manually reassigned by the management plane. 3) If an ONOS instance fails, its switches are randomly select a new master instance. 4) If an ONOS instance fails, the other instances elect a new master for each of the switches that were previously controlled by the failed instance. PreviousNext

If an ONOS instance fails, the other instances elect a new master for each of the switches that were previously controlled by the failed instance. PreviousNext

Which property of secure communication ensures that a message is not modified before it reaches the receiver? - Confidentiality - Integrity - Authentication - Availability

Integrity

In software defined networking, which network application would take precedence when managing incoming traffic? 1) Routing policies 2) Load balancing

Load balancing

The northbound interfaces separate the... 1) Management plane and control plane 2) Management plane and data plane 3) Data plane and control plane

Management plane and control plane

In conventional networking, which device can implement an intrusion detection system (IDS)? 1) Switches 2) Routers 3) Middleboxes 4) All of the above

Middleboxes

In the SDN approach, the controller that computes and distributes the forwarding tables to be used by the routers is _______________________.

Physically separate from the routers

In an SDN, the controller is responsible for the _______________ of the traffic, and the SDN-controlled network elements such as the switches are responsible for the _______________ of the traffic.

Routing, forwarding

SDNs use ________________ to control the routers' behavior (e.g., the path selection process).

Software

Determine which type of network decouples the control and data planes. - Conventional networks - Software-defined networks - Neither conventional nor software-defined networks - Both conventional and software defined networks

Software-defined networks

Software implementations in SDN controllers are increasingly open and publicly available, which _______________ innovation in the field.

Speeds up

Which attack disrupts the BGP characteristic to favor more specific prefixes? - Exact prefix hijacking - Sub-prefix hijacking - Squatting

Sub-prefix hijacking

A multiport switch and a SmartNIC are two devices that can be programmed using P4. This is possible to which of the three primary goals of the language? 1) Reconfigurability 2) Protocol independence 3) Target independence

Target independence

A Distributed Denial of Service Attack consists on the attacker sending a large volume of traffic to the victim through servers (slaves), so that the victim host becoming unreachable or in exhaustion of its bandwidth.

True

A distributed controller can be a centralized cluster of nodes or a physically distributed set of elements.

True

A few of the main reasons that SDN arose are: a diversity of different network equipment (eg routers, switches, firewalls, etc.) using different protocols that made managing the network difficult, and second a lack of a central platform to control network equipment.

True

A network controller prioritizes the rules generated by various services.

True

ARTEMIS uses a configuration file and a mechanism for receiving BGP updates from routers and monitoring services to detect BGP hijacking attacks.

True

An OpenFlow switch can function as a router.

True

An OpenFlow switch has a table of packet-handling rules, and whenever it receives a packet, it determines the highest priority matching rule, performs the action associated with it and increments the respective counter.

True

An OpenFlow switch may also be used for routing.

True

By separating the control plane and the data plane, controlling the router's behavior became easier using higher order programs. For example, it is easier to update the router's state or control the path selection.

True

DNS-based content delivery aims to distribute the load amongst multiple servers at a single location, but also distribute these servers across the world.

True

DNS-based content delivery determines the nearest server, which results in increased responsiveness and availability.

True

IP spoofing is the act of setting a false IP address in the source field of a packet with the purpose of impersonating a legitimate server.

True

In an SDX architecture, each AS can define forwarding policies as if it is the only participant at the SDX, as well as having its own SDN applications for dropping, modifying or forwarding their traffic.

True

In order to make forwarding and policy decisions in ONOS, applications get information from the view and then update these decisions back to the view.

True

In the SDN approach, ISPs or other third parties can take up the responsibility for computing and distributing the router's forwarding tables.

True

One of the disadvantages of an SDN centralized controller architecture is that it can introduce a single point of failure and also scaling issues.

True

OpenFlow enables the communication between the control plane and data plane through event-based messages, flow statistics and packet messages that are sent from forwarding devices to controller.

True

P4 acts as an interface between the switches and the controller, and its main goal is to allow the controller to define how the switches operate.

True

Round Robin DNS is a mechanism used by large websites to distribute the load of incoming requests to several servers at a single physical location.

True

SDNs divide the network in two planes: control plane and data plane, to ease management and speed up innovation.

True

The Active Networks phase consisted mainly of creating a programming interface that exposed resources/network nodes and supported customization of functionalities for subsets of packets passing through the network.

True

The P4 language allows programmers to use multiple header fields to parse, match, and perform actions on packets.

True

The P4 model allows the design of a common language to write packet processing programs that are independent of the underlying devices.

True

The forwarding model used by P4 is a pipeline.

True

The main idea behind SDNs is to divide tasks into smaller functions so the code is more modular and easy to manage.

True

The match+action tables in P4 are more flexible than those in current version of OpenFlow.

True

The network-control applications are programs that manage the underlying network with the help of the SDN controller.

True

The network-control applications use the information about the network devices and elements, provided by the controller, to monitor and control the network devices.

True

The northbound interface is used by the controller and the network-control applications to interact with each other.

True

The transition to IPv6 would be faster with a software defined networking paradigm compared to a conventional networking paradigm.

True

Traffic forwarding can be based on any number of header field values in various layers like the transport-layer, network-layer and link-layer.

True

With SDNs the control plane and data plane have independent evolution and development.

True

With the separation of the control plane and the data plane, any change to the forwarding functions on a router is independent from the routing functions of the control plane.

True

In SDN networks, the southbound interface is responsible for the communication between SDN controller and the controlled devices.

True, northbound is SDN controller <> network-control applications

What action does an OpenFlow device take when an incoming flow does NOT match any rules in any of the flow tables in the pipeline? 1) Drops the packets 2) Creates a new rule for the packets 3) Holds the packet until the controller is updated with a rule to handle it 4) Sends a message to the controller

sends a message to the controller


Set pelajaran terkait

Unit 1: Mental and Emotional Health

View Set

Public Administration PhD Comprehensive Exam

View Set

Marketing Exam 3 - Chapter 12 (Developing New Products)

View Set

Chapter 7 - Organizational Culture

View Set

AP Biology: Unit 2 Progress Check

View Set

UWCSEA - IGCSE Biology - Plant Transport Answers 1

View Set

Principles of Management Module 11 Questions

View Set