Lesson 11 Flashcards
A VLAN is created by multiple _____ that forwards all network traffic to other locations.
switches
modems
All of these answers are correct.
routers
switches
In a _____ VLAN, the network administrator must set the ports on a switch to forward the traffic to a specific VLAN.
dynamic
single
double
static
static
A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.
All of these answers are correct.
Router
Modem
VLAN
VLAN
What is one of the main benefits to implementing a VLAN into a work environment?
Better security
All of these answers are correct.
Improved stability
Easier maintenance and troubleshooting
All of these answers are correct.
In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.
networks
permissions
experiences
routers
permissions
A remote employee needs to be able to access corporate email and file sharing but doesn’t necessarily have a lot of technical knowledge. What is the best access method?
Telnet
VPN
Mosh
SSH
VPN
What main use does Telnet have in modern IT?
Telnet is used for fun things like games.
Telnet is used for secure access to remote computers.
Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.
Telnet is often used for embedded devices.
What makes Mosh an alternative to SSH?
Mosh is faster than SSH.
Mosh is easier to set up than SSH.
Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
Mosh can reconnect if a wireless connection gets interrupted.
Why is Telnet discouraged as an access method?
Telnet is slow.
Telnet is unsecure.
It’s very old.
Telnet only uses text.
Telnet is unsecure.
What access method works best over mobile connections?
SSH.
Telnet.
VPN.
Mosh.
Mosh.
SSH uses _____ cryptography to ensure authentication and security.
twin-key
public-key
white-box
round-robin
public-key
_____ is the official name of the second version of Secure Shell, which became the standard in 2006.
SSH1
Safe Shell
SSH2
Socket Security
SSH2
When two systems first connect using SSH they exchange their _____ keys with each other.
car
public
private
decoder
public
SSH client and server utilities are found on most operating systems by default, except _____.
Microsoft Windows
Linux
Unix
MAC OS X
Microsoft Windows
SSH uses a client-server model. That means that a _____ requests a connection, and the _____ accepts or rejects it.
server, client
client, server
software, hardware
computer, software
client, server