Chapter 11 - Advanced Networking Devices Flashcards

1
Q

A(n) _____ optimizes connections for delay-sensitive applications, such as voice and video over a VPN.

A

datagram TLS (DTLS) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) _____ services client requests and forwards them to the appropriate server.

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A(n) _____ enables direct VPN connections between multiple locations.

A

dynamic multipoint VPN (DMVPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A VPN connection where a single computer logs into a remote network and becomes a member of that network is commonly called a(n) _____ connection.

A

host-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ allows multiple VLANs to work across multiple switches.

A

trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of routing between two VLANs is called _____.

A

interVLAN routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routers that enable you to set QoS often use _____ to limit the amount of bandwidth used by certain devices or applications.

A

traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creating a(n) _____ helps to reduce broadcast traffic on any one network by separating the one large network into smaller ones, but it requires the use of a special switch.

A

virtual local area network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A(n) _____ is a network created by a secure tunnel from one network to another remote network.

A

virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ is a special program running on Microsoft servers that enables remote users to connect to a local Microsoft network.

A

Routing and Remote Access Service (RRAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Marcy is home sick, but she uses a VPN to connect to her network at work and is able to access files stored on the remote network just as if she were physically in the office. Which protocols make it possible for Marcy to receive an IP address from the DHCP server at work? (Select two.)

A. PPTP

B. IDS

C. L2TP

D. IPS

A

PPTP & L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one benefit of a VLAN?

A. It allows remote users to connect to a local network via the Internet.

B. It reduces broadcast traffic on a LAN.

C. It can create a WAN from multiple disjointed LANs.

D. It provides encryption services on networks that have no default encryption protocol.

A

It reduces broadcast traffic on a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where do you plug a workstation into a VLAN switch?

A. Access port

B. Proxy port

C. Trunk port

D. VLAN port

A

Access port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rashan’s company has multiple FTP servers, allowing remote users to download files. What should Rashan implement on his FTP servers so they appear as a single server with a guarantee that no single FTP server is receiving more requests than any other?

A. Load balancing

B. Port authentication

C. Port mirroring

D. Trunking

A

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following describes a VPN?

A. A remote connection using a secure tunnel across the Internet

B. Segmenting a local network into smaller networks without subnetting

C. A network that is protected from viruses

D. A protocol used to encrypt L2TP traffic

A

A remote connection using a secure tunnel across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To enable computers connected to different switches to be members of the same VLAN, what do the switches have to support?

A. Content switching

B. Port authentication

C. Port mirroring

D. Trunking

A

Trunking

17
Q

What is true of a multilayer switch?

A. It can work at multiple OSI layers at the same time.

B. It can work with one of several OSI layers at a time, depending on its configuration mode. Working at a different layer requires making a configuration change and resetting the switch.

C. It can communicate with other switches that work at different OSI layers.

D. It has twice the ports of a standard switch because it contains two regular switches, one stacked on top of the other.

A

It can work at multiple OSI layers at the same time.

18
Q

Which is an advantage of SSL VPNs over Data Link layer or Network layer VPNs?

A. SSL VPNs use specialized client software for secure connections.

B. SSL VPNs function at Layer 1, the Physical layer, and thus run much faster than Layer 2 or Layer 3 VPNs.

C. SSL VPNs offer robust security features and, therefore, do not rely on other protocols or services to handle encryption.

D. SSL VPNs don’t require specialized client software, but use Web browsers.

A

SSL VPNs use specialized client software for secure connections.

19
Q

What’s the most common method used to configure a VLAN-capable switch?

A. Log into the switch using SSH and use the command-line interface.

B. Plug into the switch with a serial cable and use the command-line interface.

C. Log into the switch via a Web browser and use the GUI.

D. Plug into the switch with a VLAN cable and use the command-line interface.

A

Log into the switch using SSH and use the command-line interface.

20
Q

What are the benefits of caching on a Web proxy? (Select two.)

A. Response time

B. Virus detection

C. Tracking

D. Authentication

A

Response time & Virus detection

21
Q

Which are effective methods of implementing load balancing? (Select two.)

A. Content switching

B. DNS round robin

C. Traffic shaping

D. Proxy serving

A

Content switching & DNS round robin

22
Q

Employees in the sales department complain that the network runs slowly when employees in the art department copy large graphics files across the network. What solution might increase network speed for the sales department?

A. DNS load balancing

B. Content switching

C. Traffic shaping

D. 802.1z

A

Traffic shaping

23
Q

Which of the following statements best applies to an IDS?

A. An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.

B. An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions.

C. An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account.

D. An IDS inspects all traffic as it enters a network and reports intrusions to a configured user account.

A

An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions.