Chapter 11: Switch Features Flashcards

1
Q

What is a managed switch?

A

A switch with an operating system that enables device configuration and can run software that implements additional features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does in-band management of a switch mean?

A

Managing the switch from the same network that moves data, whether you connect locally or remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a management port?

A

A dedicated port on every managed device used for device management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does out-of-bound management of a switch mean?

A

Managing the switch from outside the network, usually via a separate network just for managing and monitoring.

ex. A switch separate from the rest of the network and connected to the dedicated ports of the network switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does flow control do?

A

It enables the host to send an Ethernet PAUSE frame, which asks the switch to hold up for some amount of time so the host can catch its breath.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network issue can be caused by flow control?

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is port security?

A

It is locking switch ports to a specific MAC address. The port will only work with a specific computer after configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is sticky or persistent MAC?

A

In Cisco switches, the MAC addresses can be dynamically learned or manually configured, stored in the address table, and added to the running configuration file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a VLAN (Virtual Local Area Network) enable you to do?

A

It enables you to segment a physical network into multiple discreet networks without having to add additional hardware by using managed switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you set up a VLAN on a switch?

A

By creating one or more VLANs, then assigning ports to those VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call the process of transferring VLAN traffic between two or more switches?

A

Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a trunk port on a switch?

A

A port configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the IEEE trunking protocol used in VLANS that enable you to connect switches from different manufacturers?

A

802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A static VLAN assigns VLANS to ____.

A

ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A dynamic VLAN assigns VLANS to ____.

A

MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an 802.1Q tag field?

A

A field tacked onto a frame’s Ethernet header enabling the next switch to associate it with the correct VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network vulnerability that lets the attacker access VLANs they should not be able to access is called:

A

double-tagging attack

18
Q

How do you prevent a double-tagging attack?

A

By setting the native VLAN to an unused VLAN on truck ports and configuring trunk ports to tag its native VLAN traffic as well.

19
Q

What does Cisco’s proprietary protocol called VLAN Trunking Protocol (VTP) do?

A

It automates the updating of multiple VLAN switches. You put the switches into one of three states: server, client, or transparent.

20
Q

The process of passing traffic between two VLANs using a router (using one or more ports) is called:

A

inter-VLAN routing

21
Q

What type of VLAN only allows traffic from private ports to be switched to the uplink trunk port, isolating hosts from each other at Layer 2?

A

A private VLAN

22
Q

You can configure any port on a multilayer switch to act as a ____ port or a ____ port.

A

switch; router

23
Q

Making multiple servers look like a single server, creating a server cluster, and evenly distributing requests to these servers is called ____.

A

load balancing

24
Q

How does DNS performed load balancing work?

A

Each Web server gets its own public IP address and each DNS server for the domain has multiple “A” records, each with the same fully qualified domain name (FQDN). These “A” records are cycled.

25
Q

When a computer comes to the DNS server for resolution, the server responds with all the “A” records for a FQDN. Then the next time DNS is queried, all the “A” records for a FQDN are returned again but in a different order. This is known as ____.

A

round robin

26
Q

At what network layer do content switches work?

A

Layer 7 (Application layer)

27
Q

What do quality of service (QoS) policies do?

A

They prioritize traffic through rules that control how much bandwidth a protocol, PC user, VLAN, or IP address may use.

28
Q

When you control the flow of packets into or out of the network according to the type of packet or other rules, you are ____.

A

traffic shaping

29
Q

Hardware and software tools that filter traffic based on various criteria, such as port number, IP address, or protocol are called ____.

A

firewalls

30
Q

Where are firewalls located on a network?

A

On the border of the network, between the outside and the inside.

31
Q

Define: Host-Based Firewall

A

A firewall installed on a single computer, that works on the border of that system.

32
Q

An application that inspects packets, looking for active intrusions and functions inside the network is called a/an ____.

A

IDS or Intrusion Detection System

33
Q

An IDS in promiscuous mode does what?

A

Inspects a copy of every packet on a network.

34
Q

What type of IDS consists of multiple sensors placed around the network that reports to a central application that reads a signature file to detect anything out of the ordinary?

A

A network-based IDS (NIDS)

35
Q

What type of IDS runs on individual systems and monitors for events such as system file modification or registry changes?

A

A host-based IDS (HIDS)

36
Q

Similar to an IDS, a/an ____ sits directly in the flow of network traffic and can stop an attack while it is happening.

A

IPS or Intrusion Prevention System

37
Q

Copying data from any or all physical ports on a switch to a single physical port is called ____.

A

port mirroring

38
Q

What standalone multi-port hardware device copies all of the bits it sees and sends them out on a separate port for monitoring and is used for non-obtrusive data collection?

A

A network tap

39
Q

What sits between clients and external servers, pocketing the requests from the clients for external server resources and making those requests itself?

A

A proxy server

40
Q

Whom does a forward proxy server act on behalf of?

A

Clients, getting information from various sources and handing that info to the clients.

41
Q

Whom does a reverse proxy server act on behalf of?

A

Servers

Clients contact the reverse proxy server, which gathers info from its associated server(s) and hands the info to the clients.

42
Q

802.1X is an example of ____.

A

port-based authentication