Infrastructure (5) Flashcards

1
Q

Which of the following technologies can maintain an account database that multiple remote access servers can employ to authenticate remote users?

RADIUS

IDS

NGFW

A

RADIUS

A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers. Intrusion detection systems (IDSs), Next Generation Firewalls (NGFWs), and network attached storage (NAS) devices do not provide authentication services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a feature that is not found in a traditional firewall product, but which might be found in a Next Generation Firewall (NGFW)?

Stateful packet inspection

Deep packet inspection

Network Address Translation

A

Deep packet inspection

Deep packet inspection (DPI) is a firewall technique that examines the data carried in packets and not just the protocol headers. While traditional firewalls typically do not support DPI, Next Generation Firewalls (NGFWs) often do. Stateful packet inspection, Network Address Translation (NAT), and virtual private network (VPN) support are all features that are commonly supported by traditional firewall products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following services are provided by an AAA server? (Choose all correct answers.)

Authentication

Authorization

Accounting

Assistance

Attenuation

A

Authentication

Authorization

Accounting

An AAA server, such as Remote Authentication Dial-In User Service (RADIUS), provides authentication, authorization, and accounting services. Assistance and attenuation are not functions provided by AAA servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements about content filtering is true?

Content filters examine the source IP addresses of packets to locate potential threats.

Content filters enable switches to direct packets out through the correct port.

Content filters examine the data carried within packets for potentially objectionable materials

A

Content filters examine the data carried within packets for potentially objectionable materials

Content filters are a firewall feature that examines the data inside packets, rather than their origin, to locate objectionable material such as pornography. They do not scan IP addresses, nor do they detect typical types of malware. Content filters are not implemented in switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not one of the criteria typically used by load balancers to direct incoming traffic to one of a group of servers?

Which server has the fastest response time

Which server is next in an even rotation

Which server has the fastest processor

A

Which server has the fastest processor

In most cases, a load balancing router works by processing incoming traffic based on rules set by the administrator. The rules can distribute traffic among a group of servers using various criteria, such as each server’s current load or response time or which server is next in a given rotation. Load balancers typically do not use the hardware configuration of the servers to direct traffic, since this is a factor that does not change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices enables you to use a standard analog telephone to place calls using the Internet instead of the Public Switched Telephone Network (PSTN)?

Proxy server

VPN concentrator

VoIP gateway

A

VoIP gateway

A VoIP gateway is a device that provides a conduit between an IP network and the Public Switched Telephone Network (PSTN). The gateway enables standard telephones connected to the PSTN to place calls using VoIP services on the Internet. A proxy server is an application layer device that provides web browsers and other client programs to access the Internet. A virtual private network (VPN) concentrator is a type of router that enables multiple client systems to access a network from remote locations. A unified threat management (UTM) appliance typically performs VPN, firewall, and antivirus functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses? (Choose all correct answers.)

NAT router

RADIUS server

Proxy server

UTM appliance

A

NAT router

Proxy server

Network address translation (NAT) is a network layer device that converts the private IP addresses is all of a client’s transmissions to registered IP address. NAT therefore works for all applications. A proxy server is an application layer device that performs the same type of conversion, but only for specific applications. A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers. It does not convert IP addresses. A unified threat management (UTM) appliance typically performs VPN, firewall, and antivirus functions. It too does not convert IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A VPN concentrator is an advanced type of which of the following devices?

Switch

Router

Gateway

A

Router

A virtual private network (VPN) concentrator is a type of router that enables multiple client systems to access a network from remote locations. Because the device provides an interface between networks, it is considered to be a type of router, not a switch, a gateway, or a bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following technologies is typically associated with virtual PBX services?

Quality of service

Voice over IP

CARP

A

Voice over IP

A virtual PBX is an arrangement in which a telephone company provides the PBX services to a customer but maintains the actual hardware at their own facility. The recent emphasis on cloud computing has led to a number of hosted PBX solutions that use Voice over IP (VoIP) to provide services to customers. Quality of service (QoS) is a technique for prioritizing traffic by tagging packets based on their content. It is not a virtual PBX technique. The Cache Array Routing Protocol (CARP) enables proxy servers to exchange information; it does not provide virtual PBX services. In round-robin DNS, a DNS server contains multiple resource records for the same server name, each with a different IP address representing one of the computers running the server application. When a client resolves the server name, the DNS server accesses each of the resource records in turn so that each address theoretically receives the same number of visitors. This is not a virtual PBX technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph’s proposed Internet access solution is true?

The proposal fails to satisfy both the primary and secondary objectives.

The proposal satisfies the primary objective but neither of the secondary objectives.

The proposal satisfies the primary objective and one of the secondary objectives.

A

The proposal satisfies the primary objective and one of the secondary objectives.

Proxy servers provide network users with access to Internet services, and the unregistered IP addresses on the client computers protect them from unauthorized access by users on the Internet, which satisfies the first objective. The proxy servers also make it possible for network administrators to regulate users’ access to the Internet, which satisfies one of the two secondary objectives. However, the proxy servers cannot assign IP addresses to the client computers, and the plan makes no mention of DHCP or another automatic TCP/IP configuration mechanism. Therefore, the plan does not satisfy the other secondary objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following protocols can be used by wireless controllers to communicate with the access points on a wireless local area network (WLAN)? (Choose all correct answers.)

CAPWAP

LWAPP

LDAP

PPTP

A

CAPWAP

LWAPP

The Control and Provisioning of Wireless Access Points (CAPWAP) protocol and the Lightweight Access Point Protocol (LWAPP) are both protocols that enable wireless controllers to manage and control Thin access points. Lightweight Directory Access Protocol (LDAP) is used by directory services, and Point-to-Point Tunneling Protocol (PPTP) is used for virtual private networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following devices enables administrators of enterprise wireless networks to manage multiple access points from a central location?

Hypervisor

Wireless controller

Wireless endpoint

A

Wireless controller

In many enterprise wireless networks, the access points do not run a full operating system and are called Thin or lightweight APs. The network also has a device called a wireless controller that performs some of the required tasks and manages the APs. A wireless endpoint is another term for a computer or other device that is a client on the wireless network. Hypervisors and demarcation points have nothing to do with wireless networking. A hypervisor creates and manages virtual machines on a host server, and a demarcation point is the interface between a private network and an outside telecommunications service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following devices can administrators used to create multiple virtual local area networks (VLANs) and forward traffic between them?

Multilayer switch

Virtual router

Load balancer

A

Multilayer switch

A multilayer switch is a network connectivity device that function at both layer 2 and layer 3 of the OSI model. At layer 2, the device functions like a normal switch, providing individual collision domains to each connected node and enabling administrators to create multiple VLANs. At layer 3, the device also provides routing capabilities by forwarding packets between the VLANs. Virtual routers, load balancers, and broadband routers are strictly layer 3 devices that can route traffic but cannot create VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not a mechanism for distributing incoming network traffic among multiple servers?

Round-robin DNS

NLB cluster

VPN concentrator

A

VPN concentrator

A virtual private network (VPN) concentrator is a type of router that enables multiple client systems to access a network from remote locations. It does not distribute traffic among servers. A load balancer is a type of router that forwards traffic with a single IP address to multiple servers in turn. Round-robin DNS is a technique in which a DNS server resolves a name into several IP addresses, each in turn. A Network Load Balancing (NLB) cluster is a group of servers, all running the same application, that distribute incoming traffic among themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A load balancer is a type of which of the following devices?

Switch

Router

Gateway

A

Router

A load balancer is a type of router that forwards traffic with a single IP address to multiple servers in turn. In most cases, a load balancing router works by processing incoming traffic based on rules set by the administrator. Because a load balancer works with IP addresses, it is a network layer device. Load balancers are not switches, gateways, or firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following devices can provide authentication services for multiple remote access servers?

RADIUS server

VPN concentrator

Load balancer

A

RADIUS server

A Remote Authentication Dial-In User Service (RADIUS) server can provide centralized authentication, authorization, and accounting services for multiple remote access servers, using a single set of user accounts. A virtual private network (VPN) concentrator is a type of router that enables multiple client systems to access a network from remote locations. A load balancer is a type of router that forwards traffic with a single IP address to multiple servers in turn. Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) can detect and prevent malicious behavior. None of these devices can provide authentication services

17
Q

Which of the following devices expands on the capabilities of the traditional firewall by adding features like deep packet inspection (DPI) and an intrusion prevention system (IPS)?

RADIUS server

CSU/DSU

NGFW

A

NGFW

Next Generation Firewalls (NGFWs) expand on the packet filtering capabilities of traditional firewalls by adding features such as deep packet inspection (DPI) and intrusion prevention systems (IPSs), as well as inspection of encrypted traffic and antivirus scanning. Remote Authentication Dial-In User Service (RADIUS) servers can provide centralized authentication, authorization, and accounting services. A CSU/DSU is a device that provides a router on a private network with access to a leased line. A proxy server is an application layer service that receives Internet service requests from client computers, reads the application layer protocol data in each request, and then generates its own request for the same service and transmits it to the Internet server the client specifies

18
Q

Which of the following is a device that switches calls between endpoints on the local IP network and provides access to external Internet lines?

VoIP PBX

VoIP gateway

VoIP endpoint

A

VoIP PBX

A private branch exchange (PBX) switches internal calls and provides access to external lines. A VoIP PBX performs the same tasks as a traditional PBX. A VoIP gateway is the device that provides the conduit between an IP network and the Public Switched Telephone Network (PSTN). A VoIP endpoint is a device that makes use of the VoIP system, such as a computer or handset. A multilayer switch is a data networking device that includes both switching and routing capabilities

19
Q

Which of the following statements about Internet access through a proxy server accounts for the security against outside intrusion that a proxy provides?

The proxy server uses a public IP address and the client computers use private addresses.

The proxy server uses a private IP address and the client computers use public addresses.

Both the proxy server and the client computers use private IP addresses.

A

The proxy server uses a public IP address and the client computers use private addresses.

Because the client computers use private IP addresses, they are invisible to the Internet, so users outside the private network cannot see or access them. The proxy server has a public IP address so it can participate in service transactions with Internet servers. If the proxy server used a private IP address, it would not be able to access the Internet directly. If the clients used public IP addresses, they would be visible to the Internet and vulnerable to intrusion

20
Q

Which of the following statements about proxy servers and NAT servers are true? (Choose all correct answers.)

NAT servers and proxy servers can both provide Internet access to clients running any application.

NAT servers and proxy servers both use public IP addresses.

NAT servers and proxy servers both access Internet servers and relay the responses to network clients.

Both NAT servers and proxy servers cache web data for later use.

A

NAT servers and proxy servers both use public IP addresses.

NAT servers and proxy servers both access Internet servers and relay the responses to network clients.

To provide clients with Internet access, a NAT or proxy server must have direct access to the Internet, which requires using a registered, or public, IP address. Both NAT and proxy servers function as the middleman in transactions between the client computers on a private network and Internet servers. The NAT or proxy server transmits the client’s service request to the Internet server as though it was its own and, after receiving the reply, relays the response back to the client. Because NAT servers function at the network layer, clients can use any application to access the Internet through the server. Proxy servers, however, operate at the application layer and can provide Internet access only to certain types of client applications. Proxy servers are capable of caching web data for later use because they are application layer devices that read the application layer protocol data in the message packets they receive. NAT servers are network layer processes that forward packets with no knowledge of the application layer information in their contents

21
Q

A multilayer switch typically operates at which layers of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)

Physical

Data link

Network

Transport

Session

Presentation

Application

A

Physical

Data link

Network

A multilayer switch typically operates at the physical, data link, and network layers, assuming the functions of a switch and a router. The device can conceivably operate at the upper layers, but most do not

22
Q

Which of the following devices can an administrator use to monitor a network for abnormal or malicious traffic?

IDS

UPS

RADIUS

A

IDS

Intrusion detection systems (IDSs) are designed to monitor network traffic for anomalies and send notifications to administrators. Uninterruptible power supplies (UPSs), Remote Authentication Dial-In User Service (RADIUS) servers, denial-of-service (DoS) attacks, and Remote Access Service (RAS) servers all have nothing to do with network monitoring

23
Q

Which of the following is not a function that is typically provided by unified threat management (UTM) appliance?

Virtual private networking

Network firewall

Packet forwarding

A

Packet forwarding

Packet forwarding is a function typically associated with routers and is not a normal function of a UTM appliance. UTM appliances do typically perform VPN, firewall, and antivirus functions

24
Q

The jumbo frame capability is associated with which layer of the Open Systems Interconnection (OSI) model?

Transport

Network

Data link

A

Data link

Ethernet uses jumbo frames at the data link layer to transfer large amounts of data more efficiently. Ethernet typically restricts frame size to 1,500 bytes, but jumbo frames enable Ethernet systems to create frames up to 9,000 bytes. Frames are protocol data units associated only with the data link layer, so they do not apply to the network, transport, or application layer

25
Q

Which of the following storage area networking (SAN) protocols are capable of sharing a network medium with standard local area networking (LAN) traffic? (Choose all correct answers.)

iSCSI

Fibre Channel

FCoE

InfiniBand

A

iSCSI

FCoE

iSCSI runs on a standard IP network, and Fibre Channel over Ethernet (FCoE) runs on a standard Ethernet network. Both of these protocols can share a network with LAN traffic, although the use of a quality of service (QoS) mechanism is usually recommended. Fibre Channel and InfiniBand both require a dedicated network medium that does not support LAN traffic