Chapter 12: Advanced Networking Devices Flashcards

1
Q

Dedicated Server

A

A computer that only acts as a server, never a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-to-Peer network

A

Any system can act as a server, a client, or both, depending on how you configure them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Peer-to-Peer Applications (P2P)

A

Act as both client and server (uTorrent and shit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtual Private Network (VPN)

A
  • A network configuration that enables a remote user to access a private network via the Internet.
  • Use tunneling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Point-to-Point Tunneling Protocol (PPTP)

A
  • An advanced version of PPP that handles VPNs.

- Used on Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Routing and Remote Access Service (RRAS)

A

A special remote access server program on which a PPTP endpoint is placed in Microsoft networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web browser performance on a VPN

A

Hella fucking slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host-to-Site

A

Type of VPN connection where a host logs into a remote network as if it were any other local resource of that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 2 Tunneling Protocol (L2TP)

A

A VPN protocol that uses IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPN Concentrator

A

The new endpoint of the local LAN in L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Host-to-Host

A

Type of VPN connection in which a single host establishes a link with a remote, single host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Site-to-Site

A

A type of VPN connection using two Cisco VPN concentrators to connect two separate LANs permanently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSL VPN

A

A type of VPN in which clients connect to the VPN server through a web browser, with the traffic secured by SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Portal SSL VPN

A

A client accesses the VPN and is presented with a secure web page. (Like myucsc and shit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tunnel SSL VPN

A

The client web browser runs some kind of active control, such as Java or Flash, and gains much greater access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Managed Switch

A

Switches that have extra programming and logic to handle switching, security, and many other functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Console Port

A

Connection jack in a switch used to connect a computer that will manage the switch.

18
Q

Out-of-Band Management

A

Method to connect to and administer a network device. An example is connecting a computer to the console port of a switch.

19
Q

VLAN

A

Enables a single switch to support multiple logical broadcast domains

20
Q

Trunking

A

The process of transferring VLAN traffic between switches

21
Q

Trunk Port

A

A port on a switch configured to carry all traffic between switches in a LAN

22
Q

Native VLAN

A

The specified VLAN designation that will be assigned to all untagged frames entering a trunk port in a switch

23
Q

IEEE 802.1Q

A

Trunk standard that enables you to connect switches from different manufacturers

24
Q

VLAN Trunking Protocol (VTP)

A

Cisco proprietary protocol to automate the updating of multiple VLAN switches.

25
3 states of VTP
1) server 2) client 3) transparent: tells it not to update
26
DHCP Relay
A router process that allows DHCP communications to cross from one network to another.
27
IP Helper
Command used in Cisco switches and routers to enable, disable, and manage internetwork forwarding of certain protocols.
28
Multilayer Switch
Switch that works on multiple layers of the OSI model.
29
Load Balancing
The process of taking several servers and making them look like a single server, for purposes of spreading shit out.
30
Round Robin DNS
Assigning multiple IPs to the same FQDN to share the load of DNS requests
31
Quality of Service (QoS)
Policies that prioritize traffic/bandwidth based on certain rules.
32
Traffic Shaping
Controlling the flow of packets into or out of the network according to the type of packet or other rules.
33
Shapers
Network devices that can implement traffic shaping
34
Port Bonding
The logical joining of multiple redundant ports and links between two network devices. Basically to improve performance.
35
Link Aggregation Control Protocol (LACP)
IEEE specification of certain features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.
36
Intrusion Detection System (IDS)
An application that inspects packets looking for intrusions. Finds the intrusions after they have already hit.
37
Network-Based IDS (NIDS)
- Multiple sensors placed around the network that report to a central app that reads a signature file to detect weird stuff. - Signature-based IDS
38
Host-Based IDS (HIDS)
- Software running on individual systems that monitors for out of the ordinary events. - Behavior-based IDS
39
Intrusion Prevention System (IPS)
Sits directly in the flow of network traffic to stop intrusions.
40
Port Mirroring
Copying data from any or all physical ports on a switch to a single physical port.
41
Proxy Server
A device that fetches Internet resources for a client without exposing that client directly to the Internet.