Advanced Networking Devices Flashcards

1
Q

PPTP VPNs

A

Point to Point Tunneling protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RRAS

A

Routing and Remote Access Service that Microsoft builds into Windows Server that uses PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

L2TP VPN

A

Layer 2 Tunneling Protocol; took all the good feature of PPTP and L2F and added support to run on almost any type of connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN Concentrator

A

Used by L2TP vpn that uses a VPN capable router instead of a server program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference Between L2TP and PPTP

A

L2TP requires no auth or encryption; and uses IPsec for all security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL VPNs

A

Offers advantages over Data link or network Based VPNs because they don’t require any special client software. Clients connect to vpn over standard web browser with the traffic secured using TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two types of SSL VPNs

A
  1. SSL portal VPNs

2. SSL Tunnel VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL Portal VPN

A

Client accesses VPN and is presented with a secure web page where they can access anything linked to that page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL Tunnel VPN

A

Client web browser runs some kind of active control such as Java and gains more access to the VPN connected network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DTLS VPNs

A

Datagram TLS VPNs optimize connections for delay sensitive application such as voice and video over a vpn. Uses UDP rather than TCP segments for communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DMVPN

A

Dynamic Multipoint VPN enables direct VPN connections between multipole locations directly. No need to travel through the main VPN point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GRE

A

Generic Routing Encapsulation paired with IPsec for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VLAN

A

Virtual Local Area Network; allows you to segment a physical network into multiple discreet networks without having to add additional hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trunking

A

The process of transferring VLAN traffic between two or more switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trunk port

A

A port on a switch configured to carry all traffic, regardless of VLAN number bweteen all switches in a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tagging

A

Access ports that are configured to do the work of tagging traffic with the appropriate VLAN when frames enter the switch

17
Q

VTP

A

VLAN trunking protocol; allows automation of multiple VLAN switches

18
Q

3 types of switch in VTP

A
  1. Server
  2. Client
  3. Transparent

When you change vlan config on server switch, all connected client switches update their configs within minutes.

19
Q

VTP Pruning

A

a Tool for minimizing broadcast traffic.

20
Q

InterVLAN routing

A

The process of making a router work between two VLANS

21
Q

Relay Agent/DHCP Relay

A

Enabled within a router to pass DHCP messages across the router interfaces.

22
Q

Load Balancing

A

Means making a bunch of servers look like a single server, creating a server cluster.

23
Q

DNS Load Balancing

A

Each DNS server gets its own public IP address but has multiple A DNS records each with an FQDN. The DNS server then cycles around those records so the same domain name resolved to different IP addresses.

24
Q

Conent Switch

A

Can read incoming HTTP and HTTPS requests and can perform such actions as handling SSL certs and cookies or removing workload from the web servers.

25
Q

QoS and traffic Shaping

A

Quality of Service policies to prioritize traffic based on certain rules. Controlls how much bandwidth a protocol, pc, VLAN or IP can use.

26
Q

Port Bonding (link aggregation, NIC Bonding, NIC teaming, port aggregation)

A

Connecting two or more ports together and are treated as a single connection allowing the throughput to be multiplied by the number of linked connectors.

27
Q

PAgP

A

Port Aggregation Protocol; Ciscos version of Port bonding

28
Q

LACP

A

Link Aggregation Control Protocol

29
Q

LACP IEEE designation

A

IEEE 802.1AX-2014.

30
Q

Network Protection has 4 areas, what are they?

A
  1. Intrusion protection/intrusion prevention
  2. Port Mirroring
  3. Proxy Serving
  4. AAA
31
Q

Intrusion Detection/intrustion prevention

A

detect that something has intruded into a network and then do something about it.

32
Q

IDS

A

Intrusion Detection System; is an application that inspects packets, looking for active intrusions. Inspects traffic inside a network and can discover internal threats.

33
Q

Network Based IDS

A

consists of multiple sensors placed around a network often on one or both sides of the gateway router. These sensors report to a central application that reads a signature file to detect anything out of the ordinary.

34
Q

Host Based IDS

A

software running on individual systems that monitors for events such as system file modification or registry changes.

35
Q

IPS

A

Intrusion Prevention System; sits directly in the flow of network traffic. Can stop an attack while its happening. Network and bandwidth take a hit, and if it goes down the network might go down.

36
Q

HIPS

A

Host based intrusion prevention system is located on the host.

37
Q

NIPS

A

Network Intrusion prevention system.

38
Q

Port Mirroring

A

Managed Switches capability to copy data from any or all physical ports on a switch to a single physical port. Used where admin needs to inspect packets coming to or from certain computers.

39
Q

Proxy Serving

A

Sits between clients and external servers, pocketing the requests from the clients for server resources and making those requests itself.