CH11 - Course Quiz Flashcards
In DNS Load Balancing, all Web Servers share the same IP Address?
True
False
False
Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?
port mirroring
proxying
port blocking
port authentication
port mirroring
In order for a VLAN to get its name, what is typically appended to the word “VLAN”?
a slash
a number
an IP Address
a MAC Address
a number
Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a Network?
promiscuous
transparent
server
client
promiscuous
Which trunk standard enables you to connect switches from different manufacurers?
IEEE 802.11
IEEE 802.1Q
IEEE 802.1x
IEEE 802.3
IEEE 802.1Q
HTTP Proxy Servers are the least common type of proxy server?
True
False
False
On many Routers and Switches, you can implemnt QoS through bandwidth management, such as _________, where you control the flow of packets into or out of the network according to the type of packet or other rules?
port mirroring
traffic shaping
content switching
trunking
traffic shaping
It’s rare to see single Networks that combines remote incoming connections, public Web or Email Servers, wireless networks, and a string of connected switches?
True
False
False
When you set a VLAN switch to transparent, you tell it not to update but to hold on to its manual settings?
True
False
True
Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?
content switching
round robin
proxy
load balancing
load balancing
One of the really cool things about switch - and router - level authentication is the ability to fall back or fail over to a “next method” of authentication?
True
False
True
The process of passing traffic between two VLANs is called inter-VLAN Routing?
True
False
True
Which type of Network enables you to segment a physical network into multiple discreet networks without adding additional hardware?
virtual private network (VPN)
dial-up
virtual local area network (VLAN)
ethernet LAN
virtual local area network (VLAN)
Which is the most common type of Proxy Server?
IP
HTTP
FTP
TCP
HTTP
Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?
transparent, server, and client
master, server, and client
open, closed, and active
secure, transparent, and gateway
transparent, server, and client
Describe Port Bonding?
Joining two or more Ports logically in a Switch so that they work together as a Team to increase bandwidth.
Describe VTP Pruning?
Useful tool on a larger scale for minimizing broadcast traffic.
Briefly describe what happens when a computer comes to a DNS load balancing server for resolution?
DNS load balancing responds with A Records, and spaces out requests across multple servers.
The load balancing will do either a round robin via DNS or delegate a reverse lookup to handle the request from a computer.
What is the advantage of using Cisco’s VLAN Trunking Protocol (VTP)?
Updates Switch VTP Clients/Servers within minutes, can cut down big jobs of changing every Switch manually.
Describe a Reverse Proxy Server?
Acts on behalf of its Servers.
Protects the Server from the outside.
Higher Security, can handle DoS Attacks
Hides the Server.
Cisco implements DHCP relay through a configuration command called ________?
IP helper
A _________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?
network-based IDS (NIDS)
The term ________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?
out-of-band
Many new managed switches have a defualt __________ address?
IP
Every Ethernet switch uses the IEEE __________ trunk standard that enables you to connect switches from different manufacturers?
802.1Q
Which term refers to the capability of a Switch to copy data from any or all physical ports on a Switch to a single physical port?
load balancing
port authentication
port blocking
port mirroring
port mirroring
__________ specifies a number of features and option to automate the negotiation, management, load balancing, and failure modes of aggregated ports?
VLAN Trunking Protocol (VTP)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Link Aggregation Control Protocol (LACP)
Link Aggregation Control Protocol (LACP)
A _________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?
firewall
network-based IDS (NIDS)
load balancer
software-based IDS (SIDS)
network-based IDS (NIDS)
Another name for port bonding is _____________?
port aggregation
proxy serving
port blocking
port mirroring
port aggregation
Which term does CompTIA use for relay agent that is enabled and configured within a router?
trunk port
DHCP relay
tag
agent
DHCP relay
Which term is synonymous with traffic shaping?
traffic routing
port blocking
bandwidth shaping
quality of servce routing
bandwidth shaping
A managed switch needs an IP Address to enable configuration on Layer 3?
True
False
True
Content switches designed to work with Web Servers can read incoming HTTP and HTTPS requests?
True
False
True
Which tool does Cisco use to implement DHCP relay?
Yost
relay agent
IP helper
BIND
IP helper
All of the cables from joined ports must go to the same device - another switch, a storage area, network (SAN), a station, etc…?
True
False
True
A managed switch needs an _________ to enable configuration on Layer 3?
segment ID
IP Address
port number
MAC Address
IP Address
The VLAN ID a trunk port associates untagged traffic with its _______ VLAN?
home
remote
local
native
native
Describe in-band and out-of-band management?
In-Band = When you configure a Switch over a Network, anyone who knows the IP Address of the managed device. Out-of-Band = When you connect a switch to a dedicated port to reduce risk that's totally separate from the rest of the Network which will prevent unauthorized access to those Ports.
How does DHCP manage IP Address assignment?
4 Step Process called the Four-Way Handshake, or DORA.
Discover, Offer, Request, and Acknowledgement.
At what layer of the OSI model do content switches operate? Describe the advantages they provide when working with Web Servers?
Content Switches work at Layer 7 (Application) of the OSI Model.
Designed to work with Web Serers to read incoming HTTP and HTTPS requests.
You can perform very advanced actions with this, such as handling TLS Certificates and Cookies, or removing the workload from the Web Servers - Load Balancing.
How does a multilayer switch work at Layer 2 or Layer 3?
Layer 2 Switch forwards traffic based on MAC Addresses.
Layer 3 Switch forwards traffic based on IP Address and is considered a Managed Switch or a “Layer 3 Capable Switch”.
A Layer 3 Switch is a Multilayer Switch because it can operate in both Layers.
Describe voice VLANs?
VLANs that are optimized for voice data streams and prioritize voice traffic over data traffic to ensure smooth communication.
Think of QoS but for voice stream.
Anti-malicious software (Anti-Malware) developers create __________, collections of signatures for known malware?
definition files
Cisco uses a proprietary protocol called ___________ to automate the updating of multiple VLAN switches?
VLAN Trunking Protocol (VTP)
____________ refers to the capability of many managed switches to copy data from any or all physical ports on a switch to a single physical port?
Port Mirroring
The term ____________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?
out-of-band
If you have a switch in a far-flung location, it’ll be much easier to manage with some method of __________ management?
remote
The Cisco Protocol for accomplishing aggregation is called Port Aggregation Protocol (PAgP)?
True
False
True
Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?
assigned port
port 0
logical port
trunk port
trunk port
Every Web Client comes with a program that enables you to set the IP Address of the proxy server?
True
False
True
You can’t connect to a Managed Switch to tell it what you want it to do?
True
False
False
Every port starts with the default VLAN, VLAN1, so even if you don’t specify multiple VLANs, you get one by default?
True
False
True
Compare the two forms of Port Mirroring: Local and Remote?
Local - Copies data from one or more ports on a single switch to a specific port on that switch.
Remote - Enables you to access data copied from one or more specific ports on a switch without plugging directly into that switch.
How does IDS let the network administrators know if an attack is taking place?
At the very least the attack is logged, but some IDS offer a pop-up Alert message, email, or even a text message to your phone.
Define a Trunk Port?
Carries all traffic, regardless of VLAN number, between all switches in a LAN.
The process of transferring VLAN traffic between two or more switches called ____________?
Trunking
Load balancing means making a bunch of servers look like a single server, thereby creating an ______________?
server cluser
A ______________ sits in between clients and external servers, essentially pocketing the requests from the clients for servers resources and making those requests itself?
proxy server
The term _____________ management refers to configuring a switch over the network?
in-band