Advanced Networking Devices Flashcards

1
Q

Which VPN technology enables direct connections between satellite locations?

IPsec VPN

SSL VPN

DMVPN

A

DMVPN

A dynamic multipoint VPN (DMVPN) enables direct VPN connections between multiple locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a protocol popular with today’s VPNs?

PPTP

IPsec

PPPoE

A

IPsec

Most VPNs use native IPsec today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A static VLAN assigns VLANs to _______________.

IP addresses

ports

trunks

A

ports

Static VLANs assign VLANs to physical ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the trunking protocol used in today’s VLANs?

  1. 1Q
  2. 1X
  3. 1t
A

802.1Q

The 802.1Q standard is almost universal for VLAN trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A content switch always works at least at which layer of the OSI model?

3

4

7

A

7

Content switches usually work at Layers 4 through 7, but they must work at least at Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When the network is very busy, VoIP calls start to sound badly clipped. What solution might improve the quality of the VoIP calls?

802.1z

Traffic shaping

Content switching

A

Traffic shaping

Traffic shaping will provide extra bandwidth to the VoIP applications, improving sound quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of caching on a Web proxy? (Select two.)

Response time

Virus detection

Tracking

Authentication

A

Response time

Virus detection

Cached Web pages can be sent to clients quickly. The contents can also be checked for viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1X is a great example of _______________.

encryption

content switching

port authentication

A

port authentication

802.1X is port authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the most common method used to configure a VLAN-capable switch?

Log into the switch using SSH and use the command-line interface.

Plug into the switch with a console cable and use the command-line interface.

Log into the switch via a Web browser and use the GUI.

A

Log into the switch using SSH and use the command-line interface.

he most common method used to configure a VLAN-capable switch is to log into the switch using SSH and then use the command-line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements best applies to an IDS?

An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.

An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions.

An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account.

A

An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.

An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly