Advanced Networking Devices Flashcards

1
Q

an encrypted tunnel between a computer or remote network and a private network through the Internet

A

virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a virtual cable created in a VPN in which VPN software on the client creates a virtual NIC and creates a local IP address along with the IP information of a local network; that first IP address allows it to connect to a private network; the “cable” connects the client to a VPN server

A

VPN tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an advanced version of PPP for VPNs; the server endpoint is an RRAS program; when the remote computer connects to the server, the protocol creates a secure tunnel through the Internet to the private LAN; every OS has a program that supports this protocol; for security, this protocol uses autentication and encryption

A

Point-to-Point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

remote access server program on a Windows server for VPN connections

A

Routing and Remote Access Service (RRAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN protocol that combines PPTP and L2F and adds the ability to run a VPN on almost any connection, such as Ethernet, telephone, and optical connections; the server is a VPN concentrator; Cisco provides free client software to connect to the Cisco VPN; does not use encryption or authentication, relying on IPSec for all its security needs; every OS’s VPN client supports these VPNs

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cisco protocol used in the L2TP VPN protocol

A

Layer 2 Forwarding (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the VPN-capable router used in an L2TP connection rather than a VPN server program

A

VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a VPN that offers advantages over Data Link or Network based VPNS since they don’t require special client software; clients connect to the server using a Web Browser, with traffic secured by TLS

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL VPN where the client accesses the VPN via a secure Web page

A

SSL portal VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL VPN where the client runs some kind of active control (ex. Java) through the Web browser; much greater access than portal VPN, and is more like a typical host-to-site connection; need sufficient permissions

A

SSL tunnel VP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN that uses UDP datagrams through a TLS tunnel rather than TCP segment for delay-sensitive applications like voice over VPN; ex., Cisco AnyConnect…

A

Datagram TLS (DTLS) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN that enables direction VPN connections between multiple locations rather than having traffic pass through a central location

A

dynamic multipoint VPN (DMVPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN that uses Ipsec tunneling, such as Cisco IOS Easy VPN

A

IPSec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

protocol that is paired with IPSec for encryption in some VPNs

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

form of managed device configuration where configuring is done through a dedicated port that is connected to a segregated switch

A

out-of-band management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a router with out-of-band management capabilities, like management URL?, modem connection, and console port

A

console outer

17
Q

process of transferring VLAN traffic between two or more switches

A

trunking

18
Q

a configuration port on each switch in a VLAN-enabled network that sends/receives all traffic between the switches

A

trunk port

19
Q

the VLAN designation for a trunk port

A

native VLAN

20
Q

VLAN that is based on ports

A

static VLAN

21
Q

VLAN that is based on MAC Addresses; never used today

A

dynamic VLAN

22
Q

a vulnerability of native VLANs that lets an attacker access VLANs that they shouldn’t; modern network now set the native VLAN to an unused VLAN

A

double-tagging attack

23
Q

proprietary Cisco protocol that automates the updating of multiple VLAN switches; changes on the server are reflected on the client switches, while “transparent” switches hold their configuration

A

VLAN Trunking Protocol (VTP)

24
Q

tool offered with VTP for minimizing broadcast traffic

A

VTP pruning

25
Q

interVLAN routing configuration where a single router interface connects to multiple VLANs on a switch

A

router-on-a-stick

26
Q

setting on a router that, when enabled and configured, will allow the router to pass DHCP traffic across the router interfaces; ports 67 and 68

A

relay agent/DHCP relay

27
Q

Cisco proprietary configuration command that enabled DHCP relay, as well as relay for other protocols

A

IP helper (ip helper-address)

28
Q

the act of making a bunch of servers acts as a single server, creating a server cluster

A

load balancing

29
Q

form of load balancing where a single FQDN corresponds to multiple “A” DNS records; when a computer comes to DNS server for resolutions, the server cycles through these records

A

DNS load balancing

30
Q

method of QoS implementation where one controls the flow of traffic through the network based on criteria, such as guaranteeing a devices an amount of bandwidth or limiting HTTP usage

A

traffic shaping

31
Q

feature of many switches and devices where multiple ports are treated as a single connection; are outgoing cables must connect to the same device, which must support the logical joining of ports

A

port bonding/link aggregation/NIC bonding/NIC teaming/port aggregation

32
Q

the Cisco protocol for accomplishing link aggregation

A

Port Aggregation Protocol (PAgP)

33
Q

implementation of link aggregation?/protocol

A

Link Aggregation Control Protocol (LACP)

34
Q

and IDS consisting of sensors placed around a network, sometimes on both sides of the gateway; also called signature-based IdS

A

network-based IDS (NIDS)

35
Q

collection of signatures of known malware for use by anti-malware software

A

definition file

36
Q

software running on individual systems that monitors for events like system file modification or registry changes; also called behavior-based IDS

A

host-based IDS (HIDS)

37
Q

the ability of some switches to copy data from any or all physical ports to a single physical port

A

port mirroring

38
Q

proxy server that acts on behalf of clients, where the servers don’t know about the clients

A

forward proxy server

39
Q

proxy server that acts on behalf of servers; clients contact it, it gathers info from the servers, and the clients don’t know about the actual servers

A

reverse proxy server