3. Network Operations Flashcards

1
Q

This refers to visual maps of network cabling, ports, and physical layout.

A

Physical Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This diagram shows virtual/logical connections like VLANs, IP routing, and firewall zones.

A

Logical Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This diagram shows the physical placement and order of equipment in a rack.

A

Rack Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This type of diagram details the pathways and labels for all networking cables.

A

Cable Map / Cable Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This shows how physical devices are connected (e.g., cables, interfaces).

A

Layer 1 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of diagram includes MAC addresses, switches, and VLAN information.

A

Layer 2 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This diagram shows IP routing paths, subnets, and routers.

A

Layer 3 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a database or list of all hardware, software, and related licenses used by an organization.

A

Asset Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This tool helps manage and track IP addresses and subnet allocations.

A

IP Address Management (IPAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a formal agreement defining performance metrics and support expectations between provider and client.

A

Service-Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This visual tool shows wireless signal strength and coverage areas.

A

Wireless Survey / Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This marks the point when a product is no longer sold or updated with new features.

A

End-of-Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This marks when a vendor no longer provides patches, updates, or support for a product.

A

End-of-Support (EOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This includes managing and updating OS versions, patches, and firmware.

A

Software Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is the formal process of removing outdated equipment or software from production.

A

Decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a structured workflow for submitting, evaluating, and approving network changes.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This process ensures accurate, secure, and consistent network configurations are tracked and recoverable.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is the current configuration of a device actively in use.

A

Production Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a stored copy of a device’s configuration used for recovery or rollback.

A

Backup Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is a validated and approved standard config used to compare and deploy future builds.

A

Baseline / Golden Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used by network teams, this diagram helps locate devices, ports, and cabling for installation and troubleshooting.

A

Physical Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Useful in planning logical segmentation, VLANs, and IP flows, this diagram doesn’t show physical hardware.

A

Logical Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Often used by data center technicians, this diagram ensures equipment is installed in the correct position and order.

A

Rack Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Critical for cabling audits, this diagram shows cable paths, endpoints, colors, and labeling conventions.

A

Cable Map / Cable Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This layer focuses on physical connections like cables, jacks, and patch panels.

A

Layer 1 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This diagram is key for managing MAC addresses, switch ports, and VLAN IDs.

A

Layer 2 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Used by network engineers, this diagram displays routing protocols, IP subnets, and next-hop relationships.

A

Layer 3 Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Helps with tracking lifecycle stages, software licenses, and maintenance contracts for IT assets.

A

Asset Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Often used with DHCP and DNS, this system prevents IP conflicts and supports efficient subnet planning.

A

IP Address Management (IPAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Defines uptime, response time, and service quality expectations between IT providers and customers.

A

Service-Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

This visual layout is used during wireless deployments or troubleshooting to ensure strong signal coverage.

A

Wireless Survey / Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

No longer manufactured or sold, this status helps teams plan replacement strategies.

A

End-of-Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Once this is reached, vendors won’t offer patches or support—posing a security and reliability risk.

A

End-of-Support (EOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Includes OS updates, firmware upgrades, and patch management to maintain secure and stable systems.

A

Software Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When retiring equipment, this process ensures secure data wiping and proper documentation.

A

Decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Reduces risk by requiring proposed network changes to go through a review, testing, and approval process.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Involves storing and comparing config files to prevent misconfigurations and ensure recovery readiness.

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This is the active config running on a device—can differ from stored or baseline versions.

A

Production Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Stored on flash, TFTP, or other locations, this config is used to recover or revert devices.

A

Backup Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This validated config serves as the template or ‘known good’ for building or auditing other systems.

A

Baseline / Golden Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which type of diagram shows switch connections, MAC addresses, and VLAN assignments?
A. Physical diagram
B. Layer 2 diagram
C. Layer 1 diagram
D. Rack diagram

A

B. Layer 2 diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which system helps prevent duplicate IP addresses and tracks DHCP usage and subnet allocation?
A. DNS
B. RADIUS
C. IPAM
D. SLA

A

C. IPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which document defines guaranteed service levels such as uptime and response time between two parties?
A. Asset inventory
B. IPAM report
C. Service-level agreement
D. Change log

A

C. Service-level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

When a network device reaches end-of-support, what is the primary concern?
A. No new hardware features
B. No more firmware upgrades
C. Increased bandwidth
D. Security and support vulnerabilities

A

D. Security and support vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which configuration state represents a validated, approved, and consistent template used to compare other devices?
A. Production configuration
B. Backup configuration
C. Golden configuration
D. Startup configuration

A

C. Golden configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the purpose of a wireless survey or heat map?
A. Manage bandwidth allocation
B. Display DNS and DHCP usage
C. Identify optimal access point placement and signal coverage
D. Configure MAC filtering

A

C. Identify optimal access point placement and signal coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which process ensures that all changes to network configurations are reviewed and documented before implementation?
A. Configuration management
B. Change management
C. Decommissioning
D. Inventory control

A

B. Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Where would a list of switch models, software licenses, and warranty info typically be stored?
A. Rack diagram
B. Logical diagram
C. Asset inventory
D. Change control log

A

C. Asset inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is the running config currently applied to a network device?
A. Backup configuration
B. Baseline configuration
C. Startup configuration
D. Production configuration

A

D. Production configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the purpose of a patch panel in relation to documentation?
A. To organize IPAM
B. To simplify software upgrades
C. To document cable management and port mapping
D. To control voltage usage

A

C. To document cable management and port mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

This protocol is used to monitor and manage network devices by exchanging management information.

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

This SNMP alert type is sent by a device to notify a manager of a significant event.

A

Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

This SNMP database defines the structure of management data on a device.

A

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

This SNMP version supports community strings but lacks encryption.

A

SNMP v2c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

This SNMP version adds encryption and authentication for secure monitoring.

A

SNMP v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

These are shared passwords used in SNMP v1/v2c to control access.

A

Community Strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Used in SNMP v3, this confirms identity and optionally encrypts data.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

This data provides summaries of network traffic patterns (e.g., NetFlow, sFlow).

A

Flow Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

This captures detailed traffic data at the packet level for deep analysis.

A

Packet Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

These are normal performance indicators used to compare against anomalies.

A

Baseline Metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

These are notifications sent when performance deviates from the established baseline.

A

Anomaly Alerting / Notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

This process collects and stores logs from multiple devices in one place.

A

Log Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

This tool collects logs using a standardized protocol, often UDP port 514.

A

Syslog Collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

This platform analyzes log and event data for security and performance issues.

A

SIEM (Security Information and Event Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

This allows monitoring tools to interact with other systems and share data.

A

API Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

This feature duplicates network traffic to a mirror port for monitoring or capture.

A

Port Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

This process scans the network to find connected devices and systems.

A

Network Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

This type of discovery is manually initiated as needed.

A

Ad Hoc Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

This type of discovery runs at set intervals for ongoing device tracking.

A

Scheduled Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

This analyzes bandwidth usage and network flow patterns.

A

Traffic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

This monitors device and link performance, including latency and throughput.

A

Performance Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

This tracks whether devices or services are up or down.

A

Availability Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

This ensures device configurations are tracked and compared for compliance or changes.

A

Configuration Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Commonly used with agents or agentless tools, this protocol allows for centralized monitoring of devices across a network.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

These are one-way messages that allow network devices to automatically send alerts to a management station.

A

SNMP Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Without this SNMP component, a management station wouldn’t know what variables or metrics it can access.

A

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

This version of SNMP is widely used due to simplicity, but it lacks encryption and should be secured carefully.

78
Q

Preferred in secure environments, this version adds encryption and secure authentication features.

79
Q

These are used in SNMP v1/v2c to control read/write access to devices. Poorly managed strings can be a security risk.

A

Community Strings

80
Q

This ensures only trusted sources can interact with SNMP data—vital for maintaining network integrity.

A

SNMP Authentication

81
Q

Instead of showing raw packets, this summarizes communication sessions and bandwidth usage, reducing overhead.

82
Q

This allows for deep troubleshooting by viewing the actual contents of network traffic, but it can raise privacy and security concerns.

A

Packet Capture

83
Q

By understanding what ‘normal’ looks like, these values help identify performance degradation or intrusions.

A

Baseline Metrics

84
Q

Sent automatically by monitoring systems, these flag when traffic or performance deviates from normal.

A

Anomaly Alerting / Notification

85
Q

Consolidating log data into one place reduces overhead and simplifies analysis.

A

Log Aggregation

86
Q

This type of server listens for messages from network devices, often using UDP port 514.

A

Syslog Collector

87
Q

This centralized platform correlates security, performance, and log data to detect threats and monitor operations.

88
Q

Lets monitoring platforms pull/push data from other systems, enabling automation and integration.

A

API Integration

89
Q

Used on switches, this sends traffic from one port to another for inspection without affecting the flow.

A

Port Mirroring

90
Q

Used to discover unknown devices or audit existing networks, this process reveals all connected endpoints.

A

Network Discovery

91
Q

This type of discovery is manually triggered to provide a quick snapshot of the current network.

A

Ad Hoc Discovery

92
Q

This type of discovery helps maintain up-to-date topology maps over time.

A

Scheduled Discovery

93
Q

Used to find bandwidth hogs or identify unusual flows, this type of analysis is key in congestion troubleshooting.

A

Traffic Analysis

94
Q

Tracks metrics like CPU usage, interface errors, and latency to ensure smooth operation of network devices.

A

Performance Monitoring

95
Q

Alerts when critical devices like firewalls or switches become unreachable.

A

Availability Monitoring

96
Q

Compares current configs to approved versions and alerts when changes occur.

A

Configuration Monitoring

97
Q

Which protocol is commonly used to collect performance metrics from switches and routers?
A. FTP
B. SNMP
C. HTTPS
D. DNS

98
Q

Which SNMP version adds support for authentication and encryption?
A. SNMPv1
B. SNMPv2c
C. SNMPv3
D. SNMPv4

99
Q

What are SNMP traps used for?
A. Encrypting MIBs
B. Logging CLI activity
C. Alerting management systems of device events
D. Pinging neighboring devices

A

C. Alerting management systems of device events

100
Q

Which SNMP component defines which metrics and data points are available on a managed device?
A. Trap
B. Community string
C. MIB
D. Flow record

101
Q

Which method provides summarized statistics on bandwidth, protocols, and communication between hosts?
A. Packet capture
B. Flow data (e.g., NetFlow)
C. Syslog
D. SNMP

A

B. Flow data (e.g., NetFlow)

102
Q

Which monitoring method is used to analyze the contents of individual network frames and packets?
A. Flow data
B. Packet capture
C. SNMP
D. Baseline metrics

A

B. Packet Capture

103
Q

What does a baseline metric provide in network monitoring?
A. Firewall rules
B. IP address allocations
C. A comparison point for detecting anomalies
D. Network maps

A

C. A comparison point for detecting anomalies

104
Q

Which tool collects logs from multiple devices and centralizes them for correlation and security analysis?
A. Port mirror
B. Syslog
C. SIEM
D. MIB

105
Q

Which feature on a switch is used to send a copy of traffic to a monitoring port?
A. Flow export
B. Port mirroring
C. SNMP
D. NAT

A

B. Port mirroring

106
Q

Which discovery method would you use if you wanted to manually scan a network right now?
A. Flow-based
B. Ad hoc
C. Scheduled
D. Passive

107
Q

This protocol assigns IP addresses dynamically to clients on a network.

A

DHCP (Dynamic Host Configuration Protocol)

108
Q

This DHCP feature ensures a specific MAC address always gets the same IP.

A

Reservation

109
Q

This defines the range of IP addresses a DHCP server can assign.

110
Q

This sets the duration a device can use an assigned IP address.

A

Lease Time

111
Q

These are additional DHCP settings like DNS server or default gateway.

A

DHCP Options

112
Q

This allows DHCP traffic to reach servers on different subnets.

A

DHCP Relay / IP Helper

113
Q

This prevents specific IPs within a scope from being assigned to clients.

114
Q

This IPv6 feature allows devices to configure their own addresses without a DHCP server.

115
Q

This system translates domain names into IP addresses.

A

DNS (Domain Name System)

116
Q

This adds cryptographic validation to DNS responses to prevent spoofing.

117
Q

This encrypts DNS queries using HTTPS.

A

DoH (DNS over HTTPS)

118
Q

This encrypts DNS queries using TLS.

A

DoT (DNS over TLS)

119
Q

This DNS record maps a domain name to an IPv4 address.

120
Q

This DNS record maps a domain name to an IPv6 address.

A

AAAA Record

121
Q

This record creates an alias to another domain name.

A

CNAME Record

122
Q

This record defines which mail server handles email for a domain.

123
Q

This record holds arbitrary text—often used for SPF and DKIM.

A

TXT Record

124
Q

This record identifies the authoritative DNS server for a domain.

125
Q

This record maps an IP address to a domain name (used in reverse DNS).

A

PTR Record

126
Q

This DNS zone resolves domain names to IP addresses.

A

Forward Zone

127
Q

This DNS zone resolves IP addresses to domain names.

A

Reverse Zone

128
Q

This response comes from a server that holds original data.

A

Authoritative Response

129
Q

This response is based on cached or relayed data, not from the source.

A

Non-Authoritative Response

130
Q

This DNS server holds the original zone file and can be modified.

A

Primary DNS Server

131
Q

This DNS server gets a read-only copy of the zone from a primary server.

A

Secondary DNS Server

132
Q

This type of query has the DNS server do all lookups on behalf of the client.

A

Recursive Query

133
Q

This local file maps hostnames to IPs and is checked before DNS.

A

Hosts File

134
Q

This protocol synchronizes clocks on devices over the internet.

A

NTP (Network Time Protocol)

135
Q

This is a higher-precision clock synchronization protocol used in LANs.

A

PTP (Precision Time Protocol)

136
Q

This secures NTP messages using encryption and authentication.

A

NTS (Network Time Security)

137
Q

This metric defines the maximum amount of acceptable data loss in the event of a disaster, shaping backup frequency.

A

Recovery Point Objective (RPO)

138
Q

This metric sets the target duration to fully restore services after a disruption—it drives decisions around redundancy and staffing.

A

Recovery Time Objective (RTO)

139
Q

Used in SLAs and maintenance planning, this tracks how long it typically takes to fix failed systems or components.

A

Mean Time to Repair (MTTR)

140
Q

A reliability metric that predicts the expected time interval between system failures, often used in hardware selection.

A

Mean Time Between Failures (MTBF)

141
Q

This site is the least expensive option and typically involves leasing space, but setup and restore can take days or weeks.

142
Q

Often used by companies with moderate DR needs, this site includes powered-on hardware but requires data syncing before going live.

143
Q

This site is kept fully in sync with production, allowing near-zero downtime but at the highest cost.

144
Q

In this setup, both systems are live and share workloads; if one fails, the other continues processing without interruption.

A

Active-Active

145
Q

This setup has a standby system that activates only when the primary fails, saving resources but introducing a brief delay.

A

Active-Passive

146
Q

This low-cost test format brings stakeholders together to walk through the DR plan using hypothetical scenarios.

A

Tabletop Exercise

147
Q

This real-world simulation involves executing recovery procedures to ensure systems, backups, and personnel can meet DR objectives.

A

Validation Test

148
Q

Which metric defines how much data loss is acceptable in a disaster recovery scenario?
A. RTO
B. MTTR
C. RPO
D. MTBF

149
Q

Which metric describes the time allowed to fully restore systems after an outage?
A. RPO
B. RTO
C. MTBF
D. Uptime SLA

150
Q

What does MTTR represent in disaster recovery planning?
A. Time between full system upgrades
B. Time required to repair and restore failed services
C. Downtime that users can tolerate
D. Amount of recoverable data

A

B. Time required to repair and restore failed services

151
Q

Which metric predicts how often a system or component is likely to fail?
A. MTTR
B. RPO
C. MTBF
D. SLA

152
Q

Which type of disaster recovery site contains no hardware or data and may take the longest to become operational?
A. Hot site
B. Cold site
C. Warm site
D. Backup site

A

B. Cold site

153
Q

Which type of site includes powered hardware but typically requires data synchronization before use?
A. Cold site
B. Archive site
C. Warm site
D. Live site

A

C. Warm site

154
Q

Which site type is fully functional, continuously synchronized, and ready for immediate use?
A. Warm site
B. Cold site
C. Off-site backup
D. Hot site

A

D. Hot site

155
Q

In which high-availability setup are all systems active and sharing the workload simultaneously?
A. Active-passive
B. Active-active
C. Cold-hot
D. Primary-secondary

A

B. Active-active

156
Q

Which test type involves simulating a disaster and walking through the recovery plan without touching systems?
A. Validation test
B. Failover test
C. Tabletop exercise
D. Live fire drill

A

C. Tabletop exercise

157
Q

Which type of DR test verifies that the systems can be fully restored and function as expected?
A. Simulation
B. Tabletop
C. Validation test
D. Walkthrough

A

C. Validation test

158
Q

This VPN type connects two separate sites, such as branch offices, using an encrypted tunnel.

A

Site-to-Site VPN

159
Q

This VPN type allows individual remote users to connect to a central network.

A

Client-to-Site VPN

160
Q

This client-to-site VPN method uses a browser-based portal—no software install required.

A

Clientless VPN

161
Q

This VPN approach routes only some traffic through the tunnel, preserving local internet access.

A

Split Tunnel

162
Q

This VPN approach routes all traffic through the VPN for maximum security.

A

Full Tunnel

163
Q

This method of access uses a secure, encrypted command-line interface.

A

SSH (Secure Shell)

164
Q

This access method involves interacting through a visual interface like a dashboard or web portal.

A

Graphical User Interface (GUI)

165
Q

This method allows programmatic control and automation of network devices.

A

API (Application Programming Interface)

166
Q

This is the physical port used to configure devices directly, often via serial cable.

167
Q

This hardened system provides an isolated, secure environment to access and manage network devices.

A

Jump Box / Jump Host

168
Q

This management type uses the same production network for administrative access.

A

In-Band Management

169
Q

This uses a dedicated, isolated path for managing devices—even if the production network is down.

A

Out-of-Band Management

170
Q

Used to link entire office networks together securely over the internet, this type of VPN connects routers or firewalls.

A

Site-to-Site VPN

171
Q

This type of VPN allows individual users—like remote workers—to securely connect to a corporate network.

A

Client-to-Site VPN

172
Q

Often used from public devices, this VPN requires no install and runs in a web browser with limited functionality.

A

Clientless VPN

173
Q

Allows only specific traffic (like corporate resources) to pass through the tunnel, while internet-bound traffic uses the local network.

A

Split Tunnel

174
Q

Sends all traffic—including internet-bound—through the VPN tunnel, often used in high-security environments.

A

Full Tunnel

175
Q

This secure protocol provides encrypted command-line access, replacing insecure protocols like Telnet.

A

SSH (Secure Shell)

176
Q

Commonly used for firewalls, wireless controllers, and cloud platforms, this method lets users click through visual options.

A

Graphical User Interface (GUI)

177
Q

Used in automation and integration, this method allows software to send commands and queries to devices or platforms.

178
Q

This is a direct connection to a device using a serial cable, typically for initial config or when network access fails.

179
Q

Placed between the admin and sensitive devices, this hardened machine allows secure and controlled access into protected network zones.

A

Jump Box / Jump Host

180
Q

Uses the main production network path for administrative access—easy but vulnerable if that network goes down.

A

In-Band Management

181
Q

Uses a dedicated network path (e.g., separate NIC or management switch) that remains available even during production outages.

A

Out-of-Band Management

182
Q

Which type of VPN is used to connect two networks, such as corporate offices?
A. Client-to-site VPN
B. Site-to-site VPN
C. Full tunnel VPN
D. Clientless VPN

A

B. Site-to-site VPN

183
Q

Which VPN method allows remote users to connect without installing any client software?
A. Full tunnel VPN
B. Client-to-site VPN
C. Split tunnel VPN
D. Clientless VPN

A

D. Clientless VPN

184
Q

In which VPN setup is only specific traffic (e.g., corporate resources) sent through the VPN tunnel?
A. Full tunnel
B. Split tunnel
C. Clientless
D. Site-to-site

A

B. Split tunnel

185
Q

What access method provides secure, command-line access over an encrypted connection?
A. Telnet
B. GUI
C. SSH
D. SNMP

186
Q

Which of the following allows automated tools and scripts to interact with network services and devices?
A. SSH
B. API
C. Console
D. GUI

187
Q

What is a jump box used for in a secure network environment?
A. Automatically patch devices
B. Provide internet access to IoT devices
C. Act as an intermediary for managing protected systems
D. Replace firewalls

A

C. Act as an intermediary for managing protected systems

188
Q

What’s the key benefit of out-of-band management compared to in-band?
A. It uses less bandwidth
B. It integrates better with DNS
C. It works even when the primary network is down
D. It requires no authentication

A

C. It works even when the primary network is down

189
Q

Which method uses a physical or virtual port to access a device before the network is configured?
A. API
B. GUI
C. Console
D. SSH

A

C. Console

190
Q

Which method of device management is vulnerable if the production network fails?
A. API-based
B. Out-of-band
C. GUI
D. In-band

A

D. In-band

191
Q

Which type of VPN forces all traffic, including web browsing, through the tunnel?
A. Split tunnel
B. Site-to-site
C. Full tunnel
D. Clientless

A

C. Full tunnel