Chapter 1 - Networking Basics And Terminology Flashcards
Which feature of a network switch allows the network admin to capture network traffic when monitoring or troubleshooting the network?
Port Mirroring
Your manager has been reading about hackers capturing network traffic in a switched network environment and has asked you to explain how it is possible that hackers can do this.
ARP Poisoning
MAC Flooding
Your company has a web application that seems to be running slowly. What can be done to improve the performance of the application?
Install a Load Balancer
Which of the following devices could be used to limit which web sites users on the network can visit? A. Router B. Load Balancer C. Proxy Server D. CAT 5e
C. Proxy Server
Which TCP/IP protocol is used to convert the IP address to a MAC address?
ARP
Which ICMP type is used to identify echo request messages?
8
What are the stages of the three-way handshake?
SYN
SYN/ACK
ACK
Which of the following represents ports used by secure TCP applications? A. 23 B. 22 C. 80 D. 143 E. 443
B. 22
E. 443
You are the network admin for a small company, and you wish to follow security best practices that relate to the switch. What should you do?
Disable unused ports.
Configure port security.
Enable console password.
What popular feature of a switch allows you to create communication boundaries between systems connected to the switch?
VLANs