1.2 Compare and contrast networking appliances, applications, and fucntions Flashcards

1
Q

What is a router?

A
  • Routes traffic between IP subnets.
  • Routers inside of switches sometimes called “layer 3 switches”.
  • Connects diverse network types (LAN, WAN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Switch?

A
  • Bridging done in hardware;
  • Forwards data based on data link address (MAC Address)
  • Many ports and features
  • Could be a multi-layer switch (includes layer 3 routing functionality)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a firewall?

A
  • It filters traffic by TCP/UDP port number (traditional) or application (NGFW)
  • Encrypts traffic (VPN between sites)
  • Most can be labeled as layer 3 because they sit at ingress/egress of your network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Intrusion Detection System (IDS)?

A

Watches network traffic, but only detect and alert admin; will not provide “action” options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an intrusion prevention system (IPS)?

A

Watches network traffic and will alarm, alert, or stop the malicious attack/action from happening (provide options for mitigation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a load balancer?

A
  • Distributes the load over multiple servers.
  • Typically invisible to the end user.
  • Found in web server/data base server farms.
  • Provides high fault tolerance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a proxy?

A
  • It is a device that sits between the users and the external network.
  • It receives the users request and sends the request on their behalf.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Network-attached storage (NAS)?

A
  • File-level access
  • Networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.
  • Accompanying these devices are purpose-built hard disk drives.
  • Connect to a shared storage device across the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Storage Area Network (SAN)?

A
  • Block-level access (change only the blocks of data that need it; not the whole file).
  • Is solely dedicated to storage traffic, ensuring high-speed data transfer between servers and storage
  • Looks and feels like a local storage device.
  • More efficient at reading/writing files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Access Point (AP)?

A

NOT a wireless router; it is a bridge that extends the wired network onto the wireless network; OSI Layer 2 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a controller?

A
  • A hardware device or software program that manages or directs the flow of data between two entities
  • They can be cards, microchips, or separate hardware devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Wireless LAN Controller?

A

It is a centralized management of access points that allows you to deploy new access points, complete performance and security monitoring, configure and deploy changes to all sites, report on access point use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a content delivery network (CDN)?

A
  • It is designed to get data efficiently from one centralized point to an end user
  • Geographically distributed caching servers (duplicates the data and users get it from local server).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Virtual Private Network (VPN)?

A
  • The ability to secure private data traversing a public network (encrypted communication on an insecure medium).
  • Typically requires encryption/decryption access device that is often integrated into the firewall.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Quality of Service (QoS)?

A
  • “Traffic shaping” or “packet shaping” to provide a higher level of service.
  • Ability to control bandwidth usage or data rates.
  • Allows you to set important application to have higher priorities than other apps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Time to Live (TLL)?

A
  • It is a way to give a system/service/application a timer on when to end/stop
  • Wait until traversing a number hops, or wait until a certain amount of time elapses, then STOP (or DROP).
  • Will utilize the DIG command to review TTL information (nslookup has been deprecated)
17
Q

What layer is a router located at?

A

Layer 3

18
Q

What layer does a switch operate at?

A

Layer 2 - Data Link Layer
- Layer 3 if it has routing capabilities built within hardware.

19
Q

What types of actions make a load balancer properly function?

A
  • TCP offload (Protocol overhead)
  • SSL Offload (encryption/decryption)
  • Caching (fast response)
  • Prioritization (QoS)
20
Q

What are some benefits for using a proxy?

A
  • Caching information
  • Access control
  • URL filtering
  • Content scanning
21
Q

What are some examples where TTL could be used?

A
  1. Drop a packet caught in a loop.
  2. Clear a cache.
22
Q

What is the difference for TTL in routing and for DNS lookup?

A

How it is viewed. Routing will utilize the counting back method and DNS lookup is counting the number of hops to the final destination.

23
Q

What is concentrator?

A
  • It is an encryption/decryption device that is often integrated into the firewall.
  • Central connection point for all users accessing a VPN.