Network+ Extra 1 Flashcards

1
Q

Both NICs are active at the same time, and each has its own MAC address. This makes troubleshooting more complex, while giving you slightly better performance than the active-standby approach.

A

Active-active :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Only one NIC is active at a time. This approach allows the client to appear to have a single MAC address and IP address, even in the event of a NIC failure.

A

Active-Standby :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

proprietary redundancy protocol for establishing a fault-tolerant default gateway. … The protocol establishes an association between gateways in order to achieve default gateway failover if the primary gateway becomes inaccessible.

A

HSRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With each of these technologies HSRP/CARP/VRRP/GLBP, the MAC address and the IP address of a default gateway can be serviced by more than one router (or multilayer switch). Therefore, if a default gateway becomes unavailable, the other router (or multilayer switch) can take over, still servicing the same MAC and IP addresses.

A

HSRP/CARP/VRRP/GLBP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This backs up only data that has changed since the previous backup.

A

Incremental Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is similar to an incremental backup in that it starts with a full backup, and then subsequent backups only contain data that has changed. The difference is that whereas an incremental backup only includes the data that has changed since the previous backup, a differential backup contains all of the data that has changed since the last full backup.

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

differentiates between multiple traffic flows. Specifically, packets are marked, and routers and switches can then make decisions (for example, dropping or forwarding decisions) based on those markings. Because ________ does not make an explicit reservation, it is often called soft QoS.

A

QoS (diffServ) :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a device such as a switch or a router receives traffic faster than it can be transmitted, the device attempts to buffer (or store) the extra traffic until bandwidth becomes available.

A

Congestion Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If an interface’s output queue fills to capacity, newly arriving packets are discarded (or tail dropped). To prevent this behavior, a ? technique called random early detection (RED) can be used.

A

Congestion Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To encrypt transmission between a wireless client and an AP (in addition to authenticating a wireless client with an AP), both the wireless client and the AP could be preconfigured with a matching string of characters (a PSK, as previously described). The PSK could be used as part of a mathematical algorithm to encrypt traffic, such that if an eavesdropper intercepted the encrypted traffic, they would not be able to decrypt the traffic without knowing the PSK. Although using a PSK can be effective in providing security for a small network (for example, a SOHO network), it lacks scalability. For example, in a large corporate environment, a PSK being compromised would necessitate the reconfiguration of all devices configured with that PSK.

A

Preshared Key :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly