Advanced Networking Devices Flashcards
Which VPN technology enables direct connections between satellite locations?
IPsec VPN
SSL VPN
DMVPN
DMVPN
A dynamic multipoint VPN (DMVPN) enables direct VPN connections between multiple locations
Which of the following is a protocol popular with today’s VPNs?
PPTP
IPsec
PPPoE
IPsec
Most VPNs use native IPsec today
A static VLAN assigns VLANs to _______________.
IP addresses
ports
trunks
ports
Static VLANs assign VLANs to physical ports
Which of the following is the trunking protocol used in today’s VLANs?
- 1Q
- 1X
- 1t
802.1Q
The 802.1Q standard is almost universal for VLAN trunking
A content switch always works at least at which layer of the OSI model?
3
4
7
7
Content switches usually work at Layers 4 through 7, but they must work at least at Layer 7
When the network is very busy, VoIP calls start to sound badly clipped. What solution might improve the quality of the VoIP calls?
802.1z
Traffic shaping
Content switching
Traffic shaping
Traffic shaping will provide extra bandwidth to the VoIP applications, improving sound quality
What are the benefits of caching on a Web proxy? (Select two.)
Response time
Virus detection
Tracking
Authentication
Response time
Virus detection
Cached Web pages can be sent to clients quickly. The contents can also be checked for viruses
802.1X is a great example of _______________.
encryption
content switching
port authentication
port authentication
802.1X is port authentication
What’s the most common method used to configure a VLAN-capable switch?
Log into the switch using SSH and use the command-line interface.
Plug into the switch with a console cable and use the command-line interface.
Log into the switch via a Web browser and use the GUI.
Log into the switch using SSH and use the command-line interface.
he most common method used to configure a VLAN-capable switch is to log into the switch using SSH and then use the command-line interface
Which of the following statements best applies to an IDS?
An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.
An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions.
An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account.
An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.
An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions