Network Basics 2 Flashcards
What do you call the process of transferring VLAN traffic between two or more switches?
Trunking
What is a trunk port on a switch?
A port configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.
What is the IEEE trunking protocol used in VLANS that enable you to connect switches from different manufacturers?
802.1Q
A static VLAN assigns VLANS to ____.
ports
A dynamic VLAN assigns VLANS to ____.
MAC addresses
A network vulnerability that lets the attacker access VLANs they should not be able to access is called:
double-tagging attack
The process of passing traffic between two VLANs using a router (using one or more ports) is called:
inter-VLAN routing
What type of VLAN only allows traffic from private ports to be switched to the uplink trunk port, isolating hosts from each other at Layer 2?
A private VLAN
You can configure any port on a multilayer switch to act as a ____ port or a ____ port.
switch; router
Making multiple servers look like a single server, creating a server cluster, and evenly distributing requests to these servers is called ____.
load balancing
When a computer comes to the DNS server for resolution, the server responds with all the “A” records for a FQDN. Then the next time DNS is queried, all the “A” records for a FQDN are returned again but in a different order. This is known as ____.
round robin
This is how DNS performs load balancing by having each Web server gets its own public IP address and each DNS server for the domain has multiple “A” records, each with the same fully qualified domain name (FQDN).
Hardware and software tools that filter traffic based on various criteria, such as port number, IP address, or protocol are called ____.
firewalls
An application that inspects packets, looking for active intrusions and functions inside the network is called a/an ____.
IDS or Intrusion Detection System
Similar to an IDS, a/an ____ sits directly in the flow of network traffic and can stop an attack while it is happening.
IPS or Intrusion Prevention System
Copying data from any or all physical ports on a switch to a single physical port is called ____.
port mirroring
What standalone multi-port hardware device copies all of the bits it sees and sends them out on a separate port for monitoring and is used for non-obtrusive data collection?
A network tap
What sits between clients and external servers, pocketing the requests from the clients for external server resources and making those requests itself?
A proxy server
Whom does a forward proxy server act on behalf of?
Clients, getting information from various sources and handing that info to the clients.
Whom does a reverse proxy server act on behalf of?
Servers
Clients contact the reverse proxy server, which gathers info from its associated server(s) and hands the info to the clients.
802.1X is an example of ____.
port-based authentication
Define: IPv6 Address
A 128-bit address consisting of eight sets of four hexadecimal numbers, each number being a value between 0000 and ffff, using a colon to separate the numbers.
What two parts are IPv6 addresses generally split into?
A 64-bit network prefix used for routing and a 64-bit interface ID, the user portion.
The network prefix of an IPv6 address gets split into what two parts?
A routing prefix and a subnet ID.
What are the IPv6 shorthand notation rules?
Leading zeroes can be dropped and only one group of contiguous zeroes can be represented by a double colon (::).