Chapter 11 - Advanced Networking Devices Flashcards
A(n) _____ optimizes connections for delay-sensitive applications, such as voice and video over a VPN.
datagram TLS (DTLS) VPN
A(n) _____ services client requests and forwards them to the appropriate server.
proxy server
A(n) _____ enables direct VPN connections between multiple locations.
dynamic multipoint VPN (DMVPN)
A VPN connection where a single computer logs into a remote network and becomes a member of that network is commonly called a(n) _____ connection.
host-to-site
_____ allows multiple VLANs to work across multiple switches.
trunking
The process of routing between two VLANs is called _____.
interVLAN routing
Routers that enable you to set QoS often use _____ to limit the amount of bandwidth used by certain devices or applications.
traffic shaping
Creating a(n) _____ helps to reduce broadcast traffic on any one network by separating the one large network into smaller ones, but it requires the use of a special switch.
virtual local area network (VLAN)
A(n) _____ is a network created by a secure tunnel from one network to another remote network.
virtual private network (VPN)
_____ is a special program running on Microsoft servers that enables remote users to connect to a local Microsoft network.
Routing and Remote Access Service (RRAS)
Marcy is home sick, but she uses a VPN to connect to her network at work and is able to access files stored on the remote network just as if she were physically in the office. Which protocols make it possible for Marcy to receive an IP address from the DHCP server at work? (Select two.)
A. PPTP
B. IDS
C. L2TP
D. IPS
PPTP & L2TP
What is one benefit of a VLAN?
A. It allows remote users to connect to a local network via the Internet.
B. It reduces broadcast traffic on a LAN.
C. It can create a WAN from multiple disjointed LANs.
D. It provides encryption services on networks that have no default encryption protocol.
It reduces broadcast traffic on a LAN.
Where do you plug a workstation into a VLAN switch?
A. Access port
B. Proxy port
C. Trunk port
D. VLAN port
Access port
Rashan’s company has multiple FTP servers, allowing remote users to download files. What should Rashan implement on his FTP servers so they appear as a single server with a guarantee that no single FTP server is receiving more requests than any other?
A. Load balancing
B. Port authentication
C. Port mirroring
D. Trunking
Load balancing
Which of the following describes a VPN?
A. A remote connection using a secure tunnel across the Internet
B. Segmenting a local network into smaller networks without subnetting
C. A network that is protected from viruses
D. A protocol used to encrypt L2TP traffic
A remote connection using a secure tunnel across the Internet