Domain 1.2 Compare and contrast networking appliances, applications, and functions. Flashcards
Question: Which networking appliance is used to connect multiple devices within the same network and forward frames based on MAC addresses?
Answer Options:
A. Router
B. Switch
C. Firewall
D. Access Point
Correct Answer + Explanation:
Switches connect devices within the same network and forward frames based on MAC addresses stored in the MAC address table.
Practical Use:
Switches are used in LAN environments to connect PCs, printers, and other devices.
Why Others Are Incorrect:
A: Routers forward packets between networks based on IP addresses.
C: Firewalls control traffic flow based on security policies.
D: Access points provide wireless connectivity.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Switch.
Follow-Up:
What is the difference between managed and unmanaged switches?
Question: What is the primary function of a router in a network?
Answer Options:
A. Forwarding frames within the same network
B. Routing packets between different networks
C. Filtering traffic based on MAC addresses
D. Extending wireless network coverage
Correct Answer + Explanation:
Routers route packets between different networks using IP addresses and determine the best path for data.
Practical Use:
Routers are used to connect LANs to the internet or other LANs.
Why Others Are Incorrect:
A: Forwarding frames is a switch function.
C: Filtering traffic by MAC addresses is done by switches or firewalls.
D: Wireless access points extend wireless coverage.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Router.
Follow-Up:
How does a router differ from a Layer 3 switch?
Question: Which networking appliance combines routing, switching, and firewall features in a single device?
Answer Options:
A. Access Point
B. Unified Threat Management (UTM) Device
C. Load Balancer
D. Intrusion Prevention System (IPS)
Correct Answer + Explanation:
Unified Threat Management (UTM) devices combine routing, switching, firewall, and security features into a single solution.
Practical Use:
UTM devices are common in small to medium-sized businesses for simplified network management.
Why Others Are Incorrect:
A: Access points provide wireless connectivity.
C: Load balancers distribute traffic across servers.
D: IPS detects and prevents security threats.
Exam Objective Reference:
Domain 1.2: Networking Appliances - UTM.
Follow-Up:
What are the advantages of using a UTM over individual appliances?
Question: What is the primary role of a load balancer in a network?
Answer Options:
A. Distributing traffic across multiple servers
B. Providing wireless connectivity
C. Monitoring network activity
D. Filtering incoming and outgoing traffic
Correct Answer + Explanation:
Load balancers distribute traffic across multiple servers to ensure high availability and performance.
Practical Use:
Load balancers are used in web hosting to handle user requests efficiently.
Why Others Are Incorrect:
B: Wireless connectivity is provided by access points.
C: Monitoring is typically done by network monitoring tools.
D: Filtering traffic is a firewall’s function.
Exam Objective Reference:
Domain 1.2: Networking Applications - Load Balancer.
Follow-Up:
What is the difference between Layer 4 and Layer 7 load balancers?
Question: Which appliance is designed to detect and respond to security threats in real time?
Answer Options:
A. Switch
B. Router
C. Intrusion Prevention System (IPS)
D. Load Balancer
Correct Answer + Explanation:
An Intrusion Prevention System (IPS) detects and prevents security threats by analyzing network traffic.
Practical Use:
IPS devices block malicious traffic, such as SQL injection or DDoS attacks.
Why Others Are Incorrect:
A: Switches forward frames within the same network.
B: Routers route packets between networks.
D: Load balancers distribute traffic, not security threats.
Exam Objective Reference:
Domain 1.2: Networking Appliances - IPS.
Follow-Up:
How does an IPS differ from an IDS?
Question: Which appliance is used to store and share files within a network?
Answer Options:
A. Firewall
B. Network-Attached Storage (NAS)
C. Load Balancer
D. Router
Correct Answer + Explanation:
Network-Attached Storage (NAS) provides a centralized location for file storage and sharing over a network.
Practical Use:
NAS devices are used in both home and business networks for efficient data storage.
Why Others Are Incorrect:
A: Firewalls filter traffic for security purposes.
C: Load balancers manage server traffic.
D: Routers connect different networks.
Exam Objective Reference:
Domain 1.2: Networking Applications - NAS.
Follow-Up:
What is the difference between NAS and SAN?
Question: What is the primary function of a proxy server in a network?
Answer Options:
A. Monitor network traffic
B. Act as an intermediary for client requests
C. Securely connect remote users
D. Balance traffic between servers
Correct Answer + Explanation:
A proxy server acts as an intermediary between clients and servers, often providing anonymity or caching content.
Practical Use:
Proxy servers are used to filter internet traffic or cache frequently accessed websites.
Why Others Are Incorrect:
A: Monitoring traffic is done by network monitoring tools.
C: Secure connections are established via VPNs.
D: Load balancers manage server traffic.
Exam Objective Reference:
Domain 1.2: Networking Applications - Proxy Server.
Follow-Up:
What are the benefits of using a proxy server for web browsing?
Question: Which function prioritizes certain types of network traffic to ensure optimal performance?
Answer Options:
A. Load Balancing
B. Quality of Service (QoS)
C. Virtual Private Network (VPN)
D. Intrusion Detection System (IDS)
Correct Answer + Explanation:
Quality of Service (QoS) prioritizes network traffic to ensure that critical applications, such as VoIP, have the necessary bandwidth.
Practical Use:
QoS is often used in environments requiring low-latency communication, like video conferencing.
Why Others Are Incorrect:
A: Load balancing distributes traffic across servers.
C: VPN provides secure remote access.
D: IDS detects but does not prioritize traffic.
Exam Objective Reference:
Domain 1.2: Networking Functions - QoS.
Follow-Up:
How is QoS configured on modern network devices?
Question: Which networking appliance provides wireless connectivity to devices in a network?
Answer Options:
A. Switch
B. Access Point (AP)
C. Firewall
D. Load Balancer
Correct Answer + Explanation:
Access Points (APs) provide wireless connectivity to devices, enabling them to connect to the network wirelessly.
Practical Use:
APs are used in home, office, and public networks to extend wireless access.
Why Others Are Incorrect:
A: Switches handle wired connectivity.
C: Firewalls filter traffic.
D: Load balancers manage server traffic.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Access Point.
Follow-Up:
What is the difference between autonomous and lightweight access points?
Question: What is the role of a firewall in a network?
Answer Options:
A. Monitor bandwidth usage
B. Securely filter incoming and outgoing traffic
C. Extend network coverage
D. Store and share files
Correct Answer + Explanation:
A firewall filters incoming and outgoing traffic based on predefined security rules, protecting the network from unauthorized access.
Practical Use:
Firewalls prevent unauthorized access and can block malicious traffic.
Why Others Are Incorrect:
A: Bandwidth monitoring is done by network monitoring tools.
C: Extending coverage is done by access points.
D: File storage is provided by NAS or SAN devices.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Firewall.
Follow-Up:
What are the differences between hardware and software firewalls?
Question: In a high-traffic environment, a network administrator deploys a load balancer to improve performance. Which layer(s) of the OSI model can load balancers operate on?
Answer Options:
A. Layer 2 and Layer 3
B. Layer 3 and Layer 4
C. Layer 4 and Layer 7
D. Layer 5 and Layer 6
Correct Answer + Explanation:
Load balancers operate at Layer 4 (Transport) and Layer 7 (Application). At Layer 4, they manage traffic based on ports and protocols, while at Layer 7, they handle traffic based on application data.
Practical Use:
For example, a Layer 7 load balancer can route HTTP traffic to specific web servers based on URL paths.
Why Others Are Incorrect:
A: Layer 2 focuses on frame switching.
B: Layer 3 involves IP routing but lacks transport-level capabilities.
D: Layers 5 and 6 do not handle traffic distribution.
Exam Objective Reference:
Domain 1.2: Networking Applications - Load Balancer.
Follow-Up:
What are the advantages of using a Layer 7 load balancer over Layer 4?
Question: A company wants to secure its internal web servers from external threats while allowing public access. Which appliance should be deployed to achieve this?
Answer Options:
A. Firewall
B. Proxy Server
C. Router
D. Load Balancer
Correct Answer + Explanation:
A firewall should be deployed to filter incoming and outgoing traffic based on predefined security rules, protecting internal web servers.
Practical Use:
A firewall can block unauthorized traffic while permitting public HTTP/HTTPS traffic to the servers.
Why Others Are Incorrect:
B: Proxy servers handle client requests but do not directly secure servers.
C: Routers forward packets but do not enforce security rules.
D: Load balancers distribute traffic, not secure it.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Firewall.
Follow-Up:
What is the difference between stateful and stateless firewalls?
Question: A network technician installs a Unified Threat Management (UTM) device. Which of the following functions is NOT typically included in a UTM appliance?
Answer Options:
A. Antivirus scanning
B. Email filtering
C. Wireless signal extension
D. Intrusion detection
Correct Answer + Explanation:
Wireless signal extension is not a typical UTM function. UTMs focus on security features such as antivirus scanning, email filtering, and intrusion detection/prevention.
Practical Use:
UTMs consolidate multiple security functions into one device, simplifying network management.
Why Others Are Incorrect:
A: Antivirus scanning is a standard UTM feature.
B: UTMs often include email filtering capabilities.
D: Intrusion detection is part of UTM security.
Exam Objective Reference:
Domain 1.2: Networking Appliances - UTM.
Follow-Up:
What are the benefits of using a UTM in small to medium-sized businesses?
Question: A proxy server is configured in a corporate network. Which of the following is NOT a common use case for a proxy server?
Answer Options:
A. Caching frequently accessed web content
B. Filtering web requests based on content type
C. Extending wireless signal range
D. Anonymizing user requests
Correct Answer + Explanation:
Extending wireless signal range is not a function of a proxy server. Proxy servers are used for caching, filtering, and anonymizing traffic.
Practical Use:
Proxies improve performance by caching and enhance security by filtering requests.
Why Others Are Incorrect:
A: Caching reduces bandwidth usage and speeds up content delivery.
B: Filtering enhances network security and compliance.
D: Anonymizing helps protect user identities.
Exam Objective Reference:
Domain 1.2: Networking Applications - Proxy Server.
Follow-Up:
What are the differences between forward and reverse proxies?
Question: Which networking appliance is most suitable for protecting against MAC flooding attacks?
Answer Options:
A. Router
B. Switch with port security enabled
C. Firewall
D. Access Point
Correct Answer + Explanation:
A switch with port security enabled is most suitable for mitigating MAC flooding attacks by limiting the number of MAC addresses allowed per port.
Practical Use:
Enabling port security prevents malicious users from overwhelming the MAC address table of a switch.
Why Others Are Incorrect:
A: Routers do not mitigate MAC-based attacks.
C: Firewalls focus on IP traffic, not MAC-level threats.
D: Access points provide wireless connectivity.
Exam Objective Reference:
Domain 1.2: Networking Appliances - Switch.
Follow-Up:
What additional steps can be taken to secure a switch against MAC flooding?