Chapter 11 Flashcards
Which VPN technology enables direct connections between satellite locations? A) PPTP VPN B) IPsec VPN C) SSL VPN D) DMVPN
D) A dynamic multipoint VPN (DMVPN) enables direct VPN connections between multiple locations.
Which of the following is a protocol popular with today's VPN? A) PPTP B) L2TP C) IPsec D) PPPoE
C) Most VPNs use native IPsec today.
A static VLAN assigns VLANs to physical \_\_\_\_\_\_\_\_\_\_? A) IP Address B) MAC Addresses C) Ports D) Trunks
C) (Ports) Static VLANs assign VLANs to Physical Ports
Which of the following is the trunking protocol used in today's VLANs? A) 802.1Q B) 802.1X C) 802.1t D) 802.1z
A) The 802.1Q is the standard is almost universal for VLAN trunking.
A content switch always works at least at which layer of the OSI model? A) Layer 2 B) Layer 3 C) Layer 4 D) Layer 7
D) Layer 7. Content Switches usually work at Layers 4 through 7, but they must work at least at layer 7.
When the network is very busy, VoIP calls start to sound badly clipped. What solution might improve the quality of the VoIP calls? A) 802.1z B) Traffic Shaping C) DNS D) content Switchings
B) Traffic Shaping will provide extra bandwidth to the VoIP applications, Improving sound quality.
What are the benefits of caching on a Web proxy? (Select Two) A) Response Time B) Virus Detection C) Tracking D) Authentication
A and B. Cached Web pages can be sent to clients quickly. The contents can also be checked for viruses.
802.1X is a great example of \_\_\_\_\_\_? A) Encryption B) Content Switching C) Port Authentication D) VLAN Trunking
C) 802.1X is Port Authentication.
What’s the most common method used to configure a VLAN-capable switches?
A) Log into the switch using SSH and use the command-line interface.
B) Plug into the switch with a console cable and use the command-line interface.
C) Log into the switch via a Web browser and use the GUI.
D) Plug into the switch with a VLAN cable and use the command-line interface.
A) The most common method used to configure a VLAN-capable switch is to log into the switch using SSH and then use the command-line interface.
Which of the following statements best applies to an IDs?
A) An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.
B) An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions.
C) An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account.
D) An IDS inspects all traffic as it enters a network and reports intrusions to a configured user account.
A) An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.