Advanced Networking Devices Flashcards

1
Q

an encrypted tunnel between a computer or remote network and a private network through the Internet

A

virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a virtual cable created in a VPN in which VPN software on the client creates a virtual NIC and creates a local IP address along with the IP information of a local network; that first IP address allows it to connect to a private network; the “cable” connects the client to a VPN server

A

VPN tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an advanced version of PPP for VPNs; the server endpoint is an RRAS program; when the remote computer connects to the server, the protocol creates a secure tunnel through the Internet to the private LAN; every OS has a program that supports this protocol; for security, this protocol uses autentication and encryption

A

Point-to-Point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

remote access server program on a Windows server for VPN connections

A

Routing and Remote Access Service (RRAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN protocol that combines PPTP and L2F and adds the ability to run a VPN on almost any connection, such as Ethernet, telephone, and optical connections; the server is a VPN concentrator; Cisco provides free client software to connect to the Cisco VPN; does not use encryption or authentication, relying on IPSec for all its security needs; every OS’s VPN client supports these VPNs

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cisco protocol used in the L2TP VPN protocol

A

Layer 2 Forwarding (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the VPN-capable router used in an L2TP connection rather than a VPN server program

A

VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a VPN that offers advantages over Data Link or Network based VPNS since they don’t require special client software; clients connect to the server using a Web Browser, with traffic secured by TLS

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL VPN where the client accesses the VPN via a secure Web page

A

SSL portal VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL VPN where the client runs some kind of active control (ex. Java) through the Web browser; much greater access than portal VPN, and is more like a typical host-to-site connection; need sufficient permissions

A

SSL tunnel VP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN that uses UDP datagrams through a TLS tunnel rather than TCP segment for delay-sensitive applications like voice over VPN; ex., Cisco AnyConnect…

A

Datagram TLS (DTLS) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN that enables direction VPN connections between multiple locations rather than having traffic pass through a central location

A

dynamic multipoint VPN (DMVPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN that uses Ipsec tunneling, such as Cisco IOS Easy VPN

A

IPSec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

protocol that is paired with IPSec for encryption in some VPNs

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

form of managed device configuration where configuring is done through a dedicated port that is connected to a segregated switch

A

out-of-band management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a router with out-of-band management capabilities, like management URL?, modem connection, and console port

A

console outer

17
Q

process of transferring VLAN traffic between two or more switches

18
Q

a configuration port on each switch in a VLAN-enabled network that sends/receives all traffic between the switches

A

trunk port

19
Q

the VLAN designation for a trunk port

A

native VLAN

20
Q

VLAN that is based on ports

A

static VLAN

21
Q

VLAN that is based on MAC Addresses; never used today

A

dynamic VLAN

22
Q

a vulnerability of native VLANs that lets an attacker access VLANs that they shouldn’t; modern network now set the native VLAN to an unused VLAN

A

double-tagging attack

23
Q

proprietary Cisco protocol that automates the updating of multiple VLAN switches; changes on the server are reflected on the client switches, while “transparent” switches hold their configuration

A

VLAN Trunking Protocol (VTP)

24
Q

tool offered with VTP for minimizing broadcast traffic

A

VTP pruning

25
interVLAN routing configuration where a single router interface connects to multiple VLANs on a switch
router-on-a-stick
26
setting on a router that, when enabled and configured, will allow the router to pass DHCP traffic across the router interfaces; ports 67 and 68
relay agent/DHCP relay
27
Cisco proprietary configuration command that enabled DHCP relay, as well as relay for other protocols
IP helper (ip helper-address)
28
the act of making a bunch of servers acts as a single server, creating a server cluster
load balancing
29
form of load balancing where a single FQDN corresponds to multiple "A" DNS records; when a computer comes to DNS server for resolutions, the server cycles through these records
DNS load balancing
30
method of QoS implementation where one controls the flow of traffic through the network based on criteria, such as guaranteeing a devices an amount of bandwidth or limiting HTTP usage
traffic shaping
31
feature of many switches and devices where multiple ports are treated as a single connection; are outgoing cables must connect to the same device, which must support the logical joining of ports
port bonding/link aggregation/NIC bonding/NIC teaming/port aggregation
32
the Cisco protocol for accomplishing link aggregation
Port Aggregation Protocol (PAgP)
33
implementation of link aggregation?/protocol
Link Aggregation Control Protocol (LACP)
34
and IDS consisting of sensors placed around a network, sometimes on both sides of the gateway; also called signature-based IdS
network-based IDS (NIDS)
35
collection of signatures of known malware for use by anti-malware software
definition file
36
software running on individual systems that monitors for events like system file modification or registry changes; also called behavior-based IDS
host-based IDS (HIDS)
37
the ability of some switches to copy data from any or all physical ports to a single physical port
port mirroring
38
proxy server that acts on behalf of clients, where the servers don't know about the clients
forward proxy server
39
proxy server that acts on behalf of servers; clients contact it, it gathers info from the servers, and the clients don't know about the actual servers
reverse proxy server