Chapter 11 Flashcards

1
Q
Which VPN technology enables direct connections between satellite locations?
A) PPTP VPN
B) IPsec VPN
C) SSL VPN
D) DMVPN
A

D) A dynamic multipoint VPN (DMVPN) enables direct VPN connections between multiple locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is a protocol popular with today's VPN?
A) PPTP
B) L2TP
C) IPsec
D) PPPoE
A

C) Most VPNs use native IPsec today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A static VLAN assigns VLANs to physical \_\_\_\_\_\_\_\_\_\_?
A) IP Address
B) MAC Addresses
C) Ports
D) Trunks
A

C) (Ports) Static VLANs assign VLANs to Physical Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is the trunking protocol used in today's VLANs?
A) 802.1Q
B) 802.1X
C) 802.1t
D) 802.1z
A

A) The 802.1Q is the standard is almost universal for VLAN trunking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A content switch always works at least at which layer of the OSI model?
A) Layer 2
B) Layer 3
C) Layer 4
D) Layer 7
A

D) Layer 7. Content Switches usually work at Layers 4 through 7, but they must work at least at layer 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
When the network is very busy, VoIP calls start to sound badly clipped. What solution might improve the quality of the VoIP calls?
A) 802.1z
B) Traffic Shaping
C) DNS
D) content Switchings
A

B) Traffic Shaping will provide extra bandwidth to the VoIP applications, Improving sound quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What are the benefits of caching on a Web proxy? (Select Two)
A) Response Time
B) Virus Detection
C) Tracking
D) Authentication
A

A and B. Cached Web pages can be sent to clients quickly. The contents can also be checked for viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
802.1X is a great example of \_\_\_\_\_\_?
A) Encryption
B) Content Switching
C) Port Authentication
D) VLAN Trunking
A

C) 802.1X is Port Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the most common method used to configure a VLAN-capable switches?
A) Log into the switch using SSH and use the command-line interface.
B) Plug into the switch with a console cable and use the command-line interface.
C) Log into the switch via a Web browser and use the GUI.
D) Plug into the switch with a VLAN cable and use the command-line interface.

A

A) The most common method used to configure a VLAN-capable switch is to log into the switch using SSH and then use the command-line interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements best applies to an IDs?
A) An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.
B) An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions.
C) An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account.
D) An IDS inspects all traffic as it enters a network and reports intrusions to a configured user account.

A

A) An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly