2.3-2.5 Flashcards
A new network configuration includes the ability to inspect packets at the application layer to identify potential threats. Which of the following choices uses the new configuration?
Load balancer
Content Filter
Proxy Server
NGFW
NGFW
A next generation firewall is capable of parsing application layer protocol headers and data, such as hypertext transfer protocol (HTTP), so that sophisticated, content-sensitive access control lists (ACL) can be developed.
A user remotely connects to a company firewall to gain network access while traveling. What purpose does a RADIUS server provide for the connection?
Proxy
VPN Concentrator
Load balancer
AAA
AAA
An authentication, authorization, and accounting (AAA) device provides object identification, relevant permissions, and then creates an audit trail. AAA can be deployed by using a RADIUS (Remote Authentication Dial-in User Service) server.
An engineer plans to configure a device as transparent, rather than nontransparent, at an organization. Which device does the engineer configure?
VPN concentrator
Proxy server
Content filter
Load balancer
Proxy server
A proxy server is used as a middle-man for Internet access. A transparent proxy is configured on an inline device, while a nontransparent proxy is configured on a client machine.
A user states that phone calls external to the organization do not work. The engineer tests a phone and can only make internal calls. Which component needs troubleshooting?
VoIP gateway
VoIP PBX
UTM appliance
AAA/RADIUS server
VoIP gateway
A Voice over Internet Protocol (VoIP) gateway is a component in a VoIP phone system. This gateway, which can be software or hardware, is used to interface with a traditional analog phone system.
The CIO asks an IT systems administrator to configure a passive threat management solution. IT utilizes which type of technology?
Multilayer switch
IDS
VPN concentrator
IPS
IDS
An Intrusion Detection System (IDS) is a system that scans, audits, and monitors the security infrastructure for signs of attacks in progress. An IDS uses a passive approach to threat management.
A vendor visits an organization to demo a network management device. As part of the hands-on demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based on the engineer’s experience with the device, what is the vendor demonstrating?
Wireless controller
Multilayer switch
RADIUS server
UTM appliance
Wireless controller
A wireless controller is a hardware device or software application which can centralize the management function of a wireless network. An extended service set is defined in a wireless network.
At the request of management, a senior server engineer deploys a proxy server for all users in the organization. The proxy provides many benefits for a uniform user experience and for IT management. Of the choices, which statements describe features the proxy provides? (Select two)
Content filtering
Load balancing
VPN access
Caching of web content
Most web proxy servers provide caching engines, which retain frequently requested web pages, negating the need to re-fetch those pages for subsequent requests.
Caching of web content
Content filtering
A network engineer configures a secondary wide area network (WAN) interface on a firewall for a large company. With the new configuration, each WAN interface will now handle specific network traffic. Evaluate the new configuration and determine its purpose.
Load balancer
RADIUS server
Content filter
Proxy server
Load balancer
A load balancer can switch traffic to alternative nodes, reduce bottlenecks, and allow for failover services. In this case, certain traffic is being redirected to take advantage of available bandwidth.
A systems administrator deploys a proxy server for an organization. The administrator chooses to use a transparent approach to the configuration. Considering how the systems administrator deploys the proxy server, what does this configuration type utilize?
Client port configuration
Inline network appliance
Content filtering
Web content caching
Inline network appliance
A transparent proxy intercepts client traffic without the client being configured. A transparent proxy must be implemented on a switch or router or other inline network appliance.
A company’s sales team functions as a completely remote workforce. To support the team, IT implements a solution for access to internal company files and assets. Which two technologies does the IT department implement to provide this access? (Select two)
UTM appliance
VPN concentrator
RADIUS server
Proxy server
VPN concentrator
RADIUS server
When Virtual Private Network (VPN) access is part of a dedicated appliance it is known as a VPN concentrator. For example, a firewall can be used as a VPN connection point that authenticates users via a Remote Authentication Dial-in User Service (RADIUS) server.
Remote Authentication Dial-in User Service (RADIUS) is a standard protocol that can be used to manage a remote access authentication infrastructure.
A company uses multiple internet providers to maintain a reliable network. The wide area network (WAN) interfaces on a firewall handles the traffic with policies. Considering the approach to Internet access, what does this company utilize?
Content filter
Proxy server
Load balancer
RADIUS server
Load balancer
A load balancer can switch traffic to alternative nodes, reduce bottlenecks, and allow for failover services. In this case, certain traffic is being redirected to take advantage of available bandwidth.
An IT engineer implements a SonicWall firewall and a Windows server for connectivity and authentication purposes. Which of the following roles does the IT engineer configure for this implementation? (Select two)
Proxy server
VPN concentrator
RADIUS server
UTM appliance
VPN concentrator
RADIUS server
When Virtual Private Network (VPN) access is part of a dedicated appliance it is known as a VPN concentrator. For example, a firewall can be used as a VPN connection point that authenticates users via a Remote Authentication Dial-in User Service (RADIUS) server.
Remote Authentication Dial-in User Service (RADIUS) is a standard protocol that can be used to manage a remote access, authentication, and infrastructure.
In a virtualized environment, guest machines can communicate with physical systems, even with those on a different subnet. The guests, however, cannot communicate with wireless printers. Which configuration is causing the issue?
Virtual NIC
Virtual router
Virtual switch
Virtual firewall
Virtual firewall
A virtual firewall can deploy in kernel or hypervisor mode. A firewall can block communications based on ports and other criteria. The firewall should be checked to ensure communication is not blocked.
A network implementation experiences a severe bottleneck. IT personnel suggest implementing which technology to allow increased data throughput?
Virtual switch
Jumbo frame
InfiniBand
iSCSI
Jumbo frame
A jumbo frame is a frame that supports a data payload of up to 9,000 bytes and is used to overcome limits of 1,500 bytes. This in turn reduces the number of transmitted frames.
A shared storage solution uses a file-level method for data storage and sharing. Which solution is in place?
NAS
InfiniBand
FCoE
SAN
NAS
A Network Attached Storage (NAS) appliance is a hard drive, (or RAID array— redundant array of independent/inexpensive disks) that provides file-level network access via various file sharing protocols, such as NFS (network file system).
Users at a company complain to IT about slow network speeds. An engineer determines that traffic is overwhelming a network switch. After some research, the engineer looks to implement which of the following solutions to remedy the issue.
InfiniBand
Hypervisor
Jumbo frame
iSCSI
Jumbo frame
A jumbo frame is a frame that supports a data payload of up to 9,000 bytes and is used to overcome limits of 1,500 bytes. This reduces the number of transmitted frames on a network. Fewer frames means less processing a switch needs to do.
A systems administrator configures a new network storage device. The administrator discovers that an intended host system does not have a host channel adapter (HCA). The project is on hold as there are no budget funds left to purchase the adapter. Based on the requirements of the implementation, the administrator plans to use which technology?
Jumbo frame
InfiniBand
iSCSI
Hypervisor
InfiniBand
InfiniBand is a high-speed switching fabric used in storage area networks (SAN) and data center networks. It uses Host Channel Adapters (HCA) and Target Channel Adapters (TCA).