Network Basics 2 Flashcards
What do you call the process of transferring VLAN traffic between two or more switches?
Trunking
What is a trunk port on a switch?
A port configured to carry all traffic, regardless of VLAN number, between all switches in a LAN.
What is the IEEE trunking protocol used in VLANS that enable you to connect switches from different manufacturers?
802.1Q
A static VLAN assigns VLANS to ____.
ports
A dynamic VLAN assigns VLANS to ____.
MAC addresses
A network vulnerability that lets the attacker access VLANs they should not be able to access is called:
double-tagging attack
The process of passing traffic between two VLANs using a router (using one or more ports) is called:
inter-VLAN routing
What type of VLAN only allows traffic from private ports to be switched to the uplink trunk port, isolating hosts from each other at Layer 2?
A private VLAN
You can configure any port on a multilayer switch to act as a ____ port or a ____ port.
switch; router
Making multiple servers look like a single server, creating a server cluster, and evenly distributing requests to these servers is called ____.
load balancing
When a computer comes to the DNS server for resolution, the server responds with all the “A” records for a FQDN. Then the next time DNS is queried, all the “A” records for a FQDN are returned again but in a different order. This is known as ____.
round robin
This is how DNS performs load balancing by having each Web server gets its own public IP address and each DNS server for the domain has multiple “A” records, each with the same fully qualified domain name (FQDN).
Hardware and software tools that filter traffic based on various criteria, such as port number, IP address, or protocol are called ____.
firewalls
An application that inspects packets, looking for active intrusions and functions inside the network is called a/an ____.
IDS or Intrusion Detection System
Similar to an IDS, a/an ____ sits directly in the flow of network traffic and can stop an attack while it is happening.
IPS or Intrusion Prevention System
Copying data from any or all physical ports on a switch to a single physical port is called ____.
port mirroring
What standalone multi-port hardware device copies all of the bits it sees and sends them out on a separate port for monitoring and is used for non-obtrusive data collection?
A network tap
What sits between clients and external servers, pocketing the requests from the clients for external server resources and making those requests itself?
A proxy server
Whom does a forward proxy server act on behalf of?
Clients, getting information from various sources and handing that info to the clients.
Whom does a reverse proxy server act on behalf of?
Servers
Clients contact the reverse proxy server, which gathers info from its associated server(s) and hands the info to the clients.
802.1X is an example of ____.
port-based authentication
Define: IPv6 Address
A 128-bit address consisting of eight sets of four hexadecimal numbers, each number being a value between 0000 and ffff, using a colon to separate the numbers.
What two parts are IPv6 addresses generally split into?
A 64-bit network prefix used for routing and a 64-bit interface ID, the user portion.
The network prefix of an IPv6 address gets split into what two parts?
A routing prefix and a subnet ID.
What are the IPv6 shorthand notation rules?
Leading zeroes can be dropped and only one group of contiguous zeroes can be represented by a double colon (::).
What does the IPv6 “/x” prefix length naming convention specify?
The number of bits in the network ID.
What is the IPv6 loopback address?
::1
What is a link-local address and what is it used for?
The address that a computer running IPv6 gives itself after first booting. It is used for communicating on a local network.
What is the IPv6 link-local address?
The first 64 bits are always fe80::/64 (fe80:0000:0000:0000)
What address type does a client need to access IPv6 content on the Internet
A global unicast address
Does IPv6 use broadcast addresses or multicast addresses?
Multicast addresses
What is the all-nodes IPv6 multicast address?
ff02::1
The 2 (scope) indicates the local network segment.
The 1 (group) indicates all nodes within the scope.
What is the all-routers IPv6 multicast address?
ff02::2
The first 2 (scope) indicates the local network segment.
The second 2 (group) indicates all routers within the scope.
What is the Ethernet address (MAC address) for IPv6 multicast traffic?
33-33-xx-xx-xx-xx
What is the solicited-node IPv6 multicast address?
ff02::1:ffxx:xxxx (The last six digits equal the last six digits of the corresponding unicast address).
Define: IPv6 Anycast Address
A single IP address shared by multiple hosts.
Routers are configured to direct traffic destined for that single address to the closest system based on what routing metrics were chosen.
The ____ is an IPv6 protocol that performs the same functions as ARP in IPv4 and plays a role in features such as stateless address autoconfiguration (SLAAC).
NDP or Neighbor Discovery Protocol
Hosts use ____ messages to request the MAC address of a target system, to inform the target system of their own MAC address, and to verify a system is still reachable. They also help IPv6 hosts detect duplicate addresses on the local network.
neighbor solicitation
What is the neighbor discovery cache in IPv6?
A host’s list of known MAC addresses.
What are NDP’s (Neighbor Discovery Protocol’s) five control message types?
Neighbor solicitation
Neighbor advertisement
Router solicitation
Router advertisement
Redirect
Routers use ____ messages in an IPv6 network to send out important information such as their MAC and link-local addresses (default gateway), how hosts on the network should get a global unicast address, whether to use DHCP, and DNS server addresses.
router advertisement
What are router solicitation messages used for in IPv6?
Nodes on the network send them to find any routers on the network.
These packets are always sent to the all-router multicast address.
What are neighbor advertisement messages used for in IPv6?
To respond to neighbor solicitation messages with the host’s MAC address and to let the requesting system know that it is reachable.
These packets are sent via unicast addresses.
What are redirect messages used for in IPv6?
They enable a router to tell a host that there is a better router to use for traffic to a given destination when multiple routers are available for a host to use.
What does a DHCPv6 server in stateful mode do?
It tells the host the full 128-bit address it should use and keeps track of the addresses it has passed out. It also gives out other information.
What does a DHCPv6 server in stateless mode do?
It lets hosts pick out their own IPv6 addresses using SLAAC (stateless address autoconfiguration) and gives out other information.
As you get to the top of the Internet, the Tier 1 routers that connect to other Tier 1 routers can’t have any default route. These no-default routers make up the ____.
default-free zone (DFZ)
What is aggregation in IPv6?
Where every router underneath one router always uses a subset of that router’s existing routes.
What is the 6in4 IPv6 tunneling protocol?
It is one of only two IPv6 tunneling protocols that can go through IPv4 NAT (called NAT traversal).
What is NAT64?
A transition mechanism that attaches the bytes of an IPv4 address onto the end of an IPv6 address for network traversal.
Downstream routers may, in theory, do what if their upstream router suddenly changes the IPv6 prefix it delegates to them?
Send an all-nodes router advertisement so that clients can renumber.
A router feature that labels certain data to use a desired connection, and works with any type of packet switching to force certain types of data to use a certain path is called ____.
MPLS or Multiprotocol Label Switching
What is a metro Ethernet network?
A secure, private network within a city using fiber-optic cabling. This is also called a metropolitan area network (MAN).
A business that leases direct connections to the Internet and in turn provides a public on-ramp (provider links) to the Internet is called a/an ____.
ISP or Internet Service Provider
A/An ____ is a high-speed Internet connection technology that uses a modem and a regular telephone line for connectivity.
DSL or Digital Subscriber Line
For DSL and a plain old telephone service (POTS) to coexist, you need a ____ for the phone line installed.
DSL POTS filter
What protocol do cable modems use?
DOCSIS or Data Over Cable Service Interface Specification
Satellite access comes in two types:
one-way (download via satellite, upload via PSTN/dial-up)
two-way (download and upload via satellite)
Which last mile architecture enables fiber-to-the-home to connect the neighborhood switch to the premises?
PON (Passive Optical Network)
What do all remote terminal programs require?
A server (the computer to be controlled) and a client.
What two important things do VPNs (Virtual Private Networks) need to function?
Endpoints and the same network ID for the computers on both sides.
What is SONET (Synchronous Optical Network) used for?
Long-distance, high-speed, fiber optic transmission.
What VPN technology enables direct connections between satellite/multiple locations?
DMVPN or Dynamic Multipoint VPN
What protocol is commonly used with today’s VPNs?
IPsec
The ____ standard defines both how wireless devices communicate and how to secure that communication.
802.11
What is the 802.11 network operation mode where two or more devices communicate directly without any other intermediary hardware?
ad hoc mode
What is the 802.11 network operation mode that uses one or more WAPs?
infrastructure mode
Two or more wireless nodes communicating in ad hoc mode form a/an ____.
IBSS (Independent Basic Service Set)
A single WAP servicing a given area is called a/an ____.
BSS (Basic Service Set)
Multiple WAPs servicing an area is called a/an ____.
ESS (Extended Service Set)
What is a 32-bit identification string, sometimes called a network name, that’s inserted into the header of each data packet processed by a WAP (wireless access point)?
Service Set Identifier (SSID)
A spread-spectrum broadcasting method defined in the 802.11 standard that sends data out on different frequencies at the same time is called ____.
Direct-Sequence Spread-Spectrum (DSSS)
A spread-spectrum broadcasting method defined in the 802.11 standard that sends data on one frequency at a time, constantly shifting (or hopping) frequencies is called ____.
Frequency-Hopping Spread-Spectrum (FHSS)
A spread-spectrum broadcasting method defined in the 802.11 standard that combines the multiple frequencies of DSSS with FHSS’s hopping capability is called ____.
Orthogonal frequency-division multiplexing (OFDM)
For the ____GHz band, the 802.11 standard defines 14 channels (US limits it to channels 1-11) of 20 MHz each.
2.4 GHz
What three channels in the 2.4 GHz band should be used on WAPs to avoid overlap?
1, 6, and 11
The versions of 802.11 that use the ____GHz and ____GHz bands use automatic channel switching and in general have around 40 different channels in the spectrums.
5.0 GHz, 6.0 GHz
Wi-Fi networks use carrier-sense multiple access with ____ (CSMA/____)?
collision avoidance (CSMA/CA)