Network Basics and Terminology Flashcards

1
Q

Which of the following benefits are realized from implementing a load balancer? (Choose two)

a) Improved app performance
b) Increased app security
c) Increased app regulatory compliance
d) Increased app availability

A

a) Improved app performance
d) Increased app availability

Load balancers improve app performance because a pool of backend servers is available to handle client requests instead of a single server, which means that these servers can handle the additional request load that may occur. App availability is increased because a pool of backend servers is available to service client requests. A backend server failure means client requests will be serviced by backend servers that remain up and running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A busy website has not been responding well because of the large volume of HTTP requests sent to the web server. Which solution would be the most optimal to improve current and future web server performance?

A

Use two web servers hosting the same content. Configure a load balancer to distribute incoming HTTP connections between the two web servers.

Configuring multiple servers behind a load balancer allows for the distribution of incoming network traffic among those servers. This improves the performance of busy web applications and increases availability because more than one server is hosting the same application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You would like to prevent client requests from being serviced by busy backend servers hosting user sessions. Which load balancer scheduling algorithm should you configure?

a) Round robin
b) Weighted round robin
c) Random
d) Least connections

A

The least connections

The least connections algorithm ensures that traffic is sent to the backend server with the smallest amount of active connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During an IT meeting, your colleague Trinity suggests that there is a single point of failure in the single load balancer in place for the company web site ordering system. She suggests having two load balancers configured, with only one in service at a given time. What type of load balancing configuration has Trinity described?

A

Active-passive

Active-passive configurations consist of two load balancers, one of which is active. When the active load balancer is unresponsive, the second load balancer takes over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An active-passive load balancer solution is configured on your network. When the standby load balancer determines that the primary load balancer is down, what attribute does it take control of?

A

Load balancer IP address

A virtual IP address (load balancer IP address) is assigned to the active load balancer. This is the externally exposed address that the DNS names must resolve to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your public cloud–based load balancer uses Linux backend servers to host a web application. Each backend Linux host is configured with only a single private IPv4 address. You need to be able to manage each Linux backend host remotely from your on-premises network without exposing each backend server directly to the Internet. Which options should you consider? (Choose two.)

A

Configure inbound Network Address Translation (NAT) rules on the load balancer and
Configure a jump box solution

Load balancer inbound NAT rules allow incoming traffic to the load balancer on a given port, such as SSH for Linux management, to be mapped to internal hosts configured with only private IP addresses. A jump box is a physical or virtual server with at least two network interfaces with routing between the interfaces disabled. One jump box interface has a connection to a public network and the second interface has a connection to an internal network. Once authenticated to the jump box, administrators can use it as a launch pad to connect to internal hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To improve application performance for a public-facing web application, you want to reduce the amount of processing for each backend Windows server configured in a load balancer backend server pool. HTTPS is currently configured on each server. HTTPS is required to protect traffic web application traffic. What should you do?

A

Configure SSL/TLS termination at the load balancer

Configuring SSL/TLS termination at the load balancer offloads this computationally expensive operation from each backend server. This means network connections to and from the load balancer are protected using HTTPS. Traffic between the load balancer and backend servers is not protected with HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does an OSI layer 7 load balancer differ from a layer 4 load balancer?

A

Layer 7 load balancers can inspect URLs to make load balancing decisions.

Layer 7 of the OSI model, the application layer, enables access to all packet contents including the payload; therefore, URLs can be examined by the load balancer to determine which backend servers should receive the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of a load balancer health probe configuration?

A

To check backend server responsiveness

A load balancer can be configured to test connectivity to backend servers periodically on a given port number using health probes. Unresponsive backend servers are marked as unhealthy and do not receive client app requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

While testing a custom load balanced application, you determine that the app depends on client devices being connected to the same backend server throughout a session. Which load balancer option should you enable to support this kind of behavior?

A

Source IP affinity

Load balancer source IP affinity, also called client IP affinity, ensures that clients remain connected to the same backend host during an app session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv6 addresses consist of how many bits?

A

128

IPv6 addresses are 128 bits long, represented as eight 16-bit groups of hexadecimal characters, where each group is separated with a colon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to test to determine whether a local IPv6 stack is functioning on a Windows 10 host. Which command should you issue?

A

ping 0:0:0:0:0:0:0:1

The Windows ping command can be used to test IPv6 functionality for the IPv6 local loopback address of 0:0:0:0:0:0:0:1, also referred to as :: 1. The double colons represent a series of consecutive zeroes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IT technician issues the Windows ipconfig command and is concerned after noticing an address with an FE80 prefix. What should you tell the technician?

A

IPv6 hosts always have link-local unicast address beginning with FE80

The IPv6 FE80 prefix is used for link-local unicast addresses. IPv6 hosts always have this type of IP address, whether or not they are configured with a static IP address or are configured to use DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which IPv6 protocol is primarily responsible for error and status information?

A

The Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One backend server named HOST 2 is used by a load balancer in a backend pool. HOST 2 has more RAM and CPU processing power than others in the same backend pool. You need to ensure that more client requests are serviced by this powerful server. What should you do?

A

Assign a higher priority weight value to HOST 2

Assigning a higher priority weight value to HOST 2 as compared to other backend hosts in the same pool means HOST 2 will service more requests than other servers in the pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which load balancing scheduling algorithm treats all backend servers equally when it comes to client request processing capabilities?

A

Round robin

Round robin sends traffic to the first backend node, then the second, the third, back to the first, and so on. All servers are treated equally when it comes to client processing capability.

17
Q

Which of the following terms is the most closely related to a load balancer?

A

A reverse proxy

A reverse proxy accepts clients requests and forwards them to an internal host or hosts for processing, thus hiding the true identity of the internal host(s).

18
Q

Which of the following load balancing solutions is best suited for routing incoming video-streaming requests to specific backend servers optimized for streaming?

A

Layer 7 load balancer

OSI layer 7 (the application layer) load balancers can inspect URL requests, such as those that may include references to media, and send those requests to specific backend hosts configured to stream media.

19
Q

You are configuring a load balancer to support a backend pool of FTP servers using standard port numbers. Which TCP ports should the load balancer accept FTP requests on?

A

20, 21

FTP normally uses TCP ports 20 and 21.

20
Q

Users complain that when they access a load balanced shopping web site, periodically the contents of their shopping cart is lost. What should you configure in the load balancer to alleviate the issue?

A

Persistence

Configuring the load balancer persistence setting ensures that client session traffic continues to the same backend server. This can be especially important when server-side storage is used for user sessions.

21
Q

You are configuring load balancer support for an HTTPS custom web application. Which of the following statements regarding this scenario are correct? (Choose two.)

A

Backend servers can listen on any port number;
Traffic between the load balancer and backend servers does not have to be encrypted

Backend web servers may be configured to listen on TCP port 400, while the load balancer VIP configuration listens on the standard HTTPS port, TCP 443. Load balancers can be configured as SSL/TLS termination points to offload the extra encryption/decryption processing from the backend servers.

22
Q

You are designing a load balancing strategy for a multi-tiered web app named APP1 that uses frontend publicly accessible web servers, application servers, and database servers. APP1 experiences a large number of requests each day. You need to ensure that the performance of each web app tier is optimized. What should you do?

A

Configure a public load balancer in front of the web servers, an internal load balancer between web servers and app servers, and another internal load balancer between app servers and database servers.

To ensure that each web app tier performs optimally, each tier should have a load balancer; a public load balancer between the Internet and the frontend web servers, an internal load balancer between web servers and apps servers, and another internal load balancer between app servers and database servers.

23
Q

Which IPv6 protocol is used to discover neighboring hosts on a local area network?

A

Neighbor Discovery Protocol (NDP) is used by IPv6 to discover nodes on a local are network.

24
Q

You have configured two load balancers to work together. The first load balancer routes all client traffic to backend servers, while the second load balancer is idle. What type of configuration is this?

A

Active-passive

An active-passive load balancer configuration links two load balancers together for high availability, but only one load balancer is active at any time