1.8 Summarize evolving use cases for modern network environments. Flashcards

1
Q

What is SDN?

A

(Software-defined Network)
- Networking devices have different functional planes of operation (data, contorl, and management planes)
- Splitting the functions into separate logical units to be utilized in a virtual environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SD-WAN?

A
  • (Software-defined Wide Area Network)
  • A WAN built for the cloud.
  • The data center used to be in one place. Now those services and applications are moved to the could.
  • No need to hop through a central point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does it mean to be application-aware?

A

The WAN knows which app is in use which makes routing decisions based on the application data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is zero-touch provisioning?

A
  • Remote equipment is automatically configured.
  • Application traffic uses the most optimal path.
  • Can change based on traffic patterns and network health.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean to be transport agnostic?

A
  • The underlying network can be any type (Cable modem, DSL, Fiber-based, 5G, etc. It will automatically pick the best choice for the location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Central Policy Management?

A
  • Management and configuration on a single console, leaving only one device that needs to be configured
  • Changes can be pushed to the SD-WAN routers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is VXLAN?

A
  • (Virtual Extensible Local Area Network)
  • This is a way to connect data centers without worry about the underlying infrastructure (wires, connections, IP Schemes, etc.)
  • Designed to support hundreds of thousands of tenants.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DCI?

A
  • (Data Center Interconnect)
  • Connecting multiple data centers together, seamlessly spanning across different geographic distances.
  • Connect and segment different customer networks.
  • Distribute applications everywhere.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VXLAN encapsulation?

A

This allows two different virtual machines in different locations to feel as though they are directly connected to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ZTA?

A
  • (Zero Trust Architecture)
  • A holistic approach to security that covers every device, every process, and every person.
  • Everything must be verified
  • Nothing is inherently trusted
  • It uses Multi-factor authentication, encryption, system permissions, additional firewalls, monitoring and analytics, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does authentication fit into ZTA?

A

Policy-based authentication employs adaptive identity and policy-driven access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does authorization fit into ZTA?

A
  • It determines which applications and data are accessible.
  • Different rights depending on the user (help desk techs can view the hardware database, help desk managers can modify the database, other users have no access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does least privilege access fit into ZTA?

A
  • Rights and permissions should be set to the bare minimum.
  • All user accounts must be limited.
  • Don’t allow users to run with admin privileges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SASE / SSE?

A

(Secure Access Secure Edge / Security Service Edge)
- This is a Next Gen VPN that allows you to securely connect from different locations utilizing cloud services.
- SASE clients are installed on all user devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IaC?

A

(Infrastructure as Code)
- Describe a networking infrastructure can be configured as a code.
- It allows you to modify the infrastructure and create versions (the same way you version application code).
- Use the description (code) to build other applications instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain automation with regards to IaC.

A
17
Q

How do you use playbooks/templates/reusable tasks in Automation?

A
  • A Playbook is a set of conditional steps to follow (a broad process) that allows you to investigate a data breach and also recover from ransomware attacks.
  • A reusable template
  • Can be used to create automated activities.
18
Q

How do you use configuration drift/compliance in Automation?

A
  • Ensure the same configurations for all systems.
  • The configuration used in testing should be the same in production.
  • IaC provides an identical deployment.
19
Q

How would you use upgrades in Automation?

A
  • Change a configuration with a single line of code.
  • Modify configuration and software.
20
Q

How would you use dynamic inventories in Automation?

A
  • Query devices in real-time.
  • Manage and make changes based on the results.
21
Q

What is source control with regards to IaC?

A
  • It allows you to manage change
  • Developers can create the infrastructure requirements
  • You can build and publish the definition.
22
Q

What is Version Control in IaC?

A
  • It allows you to manage ongoing changes to the code (example would by “Git”).
23
Q

How would you leverage a central repository as source control?

A
  • This allows you to track changes across multiple updates.
  • Everyone can participate without causing issues with the code.
24
Q

How would you leverage conflict identification as source control?

A
  • Some conflicts may be able to handled automatically by code others may need to have manual intervention.
25
Q

How would you leverage branching as source control?

A
  • This would allow you to move away from the main line of development and work without making changes to the main code.
  • You would then branch and merge, branch and merge.
26
Q

Explain what IPv6 is and why we need to use it.

A
  • Estimated 20 billion devices connected to the internet (and growing) and IPv4 supports around 4.29 billion addresses.
  • IPv4 address space has been exhausted.
  • NAT is the workaround but not permanent fix.
27
Q

How do we mitigate address exhaustion?

A

IPv6 provides a larger address space with room for growth.

28
Q

What are the compatibility requirements for IPv6?

A
  • Not all devices can talk/communicate with IPv6. This requires an alternate form of communication via Tunneling, Dual Stack, and NAT64.
29
Q

Please explain tunneling with regards to IPv6.

A
  • Encapsulate one protocol within another.
  • A migration option designed for temporary use.
  • 6 to 4 or 4 to 6 tunneling (requires specialized relay router and no support of NAT; no longer an option for Windows).
30
Q

Please explain dual stack with regards to IPv6.

A
  • Have the option to use both IPv4 and IPv6.
  • Running both at the same time
  • Interfaces will be assigned multiple address types.
  • Application can choose which one is best to use.
31
Q

Please explain NAT64 with regards to IPv6.

A
  • Convert between IPv4 and IPv6.
  • Seamless to the end user.
  • Uses a NAT64-capable router.
  • Works with a DNS64 server to translate DNS requests.
32
Q

What is the Data Plane / Infrastructure Layer?

A

This is the part of SDN that would process the frames and packets, does the forwarding of traffic, trunking, encrypting and NAT.

33
Q

What is the Control Layer / Plane?

A
  • This is the part of SDN that manages the actions of the data plane.
  • It handles the routing tables, session tables, and NAT Tables, as well as dynamic routing protocol updates.
34
Q

What is the difference between VLAN & VXLAN?

A

VLAN
- Max of 4,000 possible virtual networks
- Fixed Layer 2 domain
- not designed for large scale and dynamic movement of VMs

VXLAN
- Over 16 Million possible virtual networks
- Tunnel frames across a layer 3 network
- Built to accomodate large Virtual environments.

35
Q

What is adaptive identity?

A
  • Consider the source and the requested resources.
  • Multiple risk indicators - relationship to the organization, physical location, type of connection, IP addresses, etc.
  • Make the authentication stronger, if needed.
36
Q

What is policy-driven access control?

A
  • Combine the adaptive identiy with a predefined set of rules.
  • Evaluates each access decision based on policy and other information.
  • Grant, deny, or revoke.
37
Q

IPv6 Addresses

A
  • 128-bit addresses
  • 16 bits = 2 bytes = 2 octets
  • Compressed Form: groups of zeros can be abbreviated with a double colon (only one of these abbreviations allowed per address) and leading zeros are optional.