Network Operations (6) Flashcards

1
Q

Which of the following is not a fault tolerance mechanism?

UPS

RAID 1

SNMP

A

SNMP

Simple Network Monitoring Protocol (SNMP) is a means of tracking the performance and functionality of network components. Software or firmware components called agents are embedded in network devices and communicate with a central monitoring console. SNMP does not provide fault tolerance. A uninterruptible power supply (UPS) is a battery backup device that enables a computer to continue functioning in the event of a power failure. Redundant Array of Independent Disks (RAID) level 1 is a disk mirroring mechanism that provides fault tolerance by maintaining duplicate copies of all stored data. Clustering is a mechanism by which multiple servers function as a single unit, running the same application, so that if a server should fail, the others continue to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of virtual private networking (VPN) connection is the best solution for connecting a branch office to a corporate headquarters?

Host-to-site

Site-to-site

Host-to-host

A

Site-to-site

A site-to-site VPN enables one network to connect to another, enabling users on both networks to access resources on the other one. This is usually a more economical solution for branch office connections than a wide area network (WAN) link. A host-to-site VPN is a remote access solution, enabling users to access the corporate network from home or while traveling. A host-to-host VPN enables two individual users to establish a protected connection to each other. An extranet VPN is designed to provide clients, vendors, and other outside partners with the ability to connect to your corporate network with limited access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ralph is a network administrator for a firm that is allowing employees to telecommute for the first time, and he is responsible for designing a remote access solution that will enable users to access network resources, such as company email and databases, securely. All of the remote users have been issued smartcards and will be connecting using virtual private network (VPN) connections on company-supplied laptop computers running Windows 10 and equipped with card readers. The users will be logging on to the company network using their standard Active Directory Domain Services accounts, so it’s important for Ralph to design a solution that provides the maximum protection for their passwords, both inside and outside the office. Which of the following authentication protocols should you configure the remote access servers and the laptop computers to use?

Password Authentication Protocol (PAP)

Challenge Handshake Authentication Protocol (CHAP)

Extensible Authentication Protocol (EAP)

A

Extensible Authentication Protocol (EAP)

EAP is the only authentication protocol included with Windows 10 that supports hardware-based authentication, so this is the only viable option. PAP transmits passwords in clear text and is therefore not a viable option, as is CHAP, because it must store passwords using reversible encryption. MSCHAPv2 provides sufficient password protection but does not support hardware-based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following remote access protocols provides users with full graphical control over a Windows computer? (Choose all correct answers.)

SSH

RDP

VNC

Telnet

A

RDP

VNC

RDP is a component of Remote Desktop Services, a Windows mechanism that enables a client program to connect to a server and control it remotely. RDP does not carry actual application data; it just transfers keystrokes, mouse movements, and graphic display information. Virtual Network Computing (VNC) is a similar desktop sharing system that is platform independent and open source. Secure Shell (SSH) and Telnet are character-based remote control solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following types of traffic are carried by the Remote Desktop Protocol (RDP)? (Choose all correct answers.)

Keystrokes

Mouse movements

Display information

Application data

A

Keystrokes

Mouse movements

Display information

RDP is a component of Remote Desktop Services, a Windows mechanism that enables a client program to connect to a server and control it remotely. RDP does not carry actual application data; it just transfers keystrokes, mouse movements, and graphic display information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of traffic are transmitted by Virtual Network Computing (VNC)? (Choose all correct answers.)

Keystrokes

Mouse movements

Display information

Application data

A

Keystrokes

Mouse movements

Display information

VNC is a graphical desktop sharing system that uses a protocol called Remote Frame Buffer (RFB) to connect a client to a server and control it remotely. VNC does not transmit actual application data; it just transfers keystrokes, mouse movements, and graphic display information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following types of traffic are carried by Telnet? (Choose all correct answers.)

Keystrokes

Mouse movements

Display information

Application data

A

Keystrokes

Display information

Telnet is a character-based remote control protocol and application that is available on virtually all computing platforms. Because it is strictly character based, Telnet clients transmit only keystrokes and receive only character-based display information from the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary shortcoming of the File Transfer Protocol (FTP) that is addressed by FTPS and SFTP?

Lack of security

Slow file transfers

File size limitations

A

Lack of security

FTP does provide authentication capabilities, but passwords are transmitted over the network in clear text, which is an unacceptable security condition. FTPS adds security in the form of the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. SFTP adds Secure Shell (SSH) security. File transfer speed and size limitations are not an issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following File Transfer Protocol (FTP) variants transmit authentication passwords over the network in clear text?

FTP

FTPS

SFTP

A

FTP

FTP provides authentication capabilities, but it transmits passwords over the network in clear text, which is an unacceptable security condition. FTPS adds security in the form of the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. SFTP adds Secure Shell (SSH) security. Both of these encrypt authentication passwords before transmitting them. Trivial File Transfer Protocol (TFTP) does not authenticate clients, so it does not transmit passwords at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following File Transfer Protocol (FTP) variants is typically used to download boot image files during Preboot Execution Environment (PXE) startup sequences?

FTPS

SFTP

TFTP

A

TFTP

Trivial File Transfer Protocol (TFTP) is a simplified version of FTP that does not authenticate clients, so systems booting with PXE can download boot images invisibly after being directed to a TFTP server by the Dynamic Host Configuration Protocol (DHCP). FTP, FTPS, and SFTP all require authentication and other interaction, which would be impractical for use with PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements about in-band management and out-of-band management are true? (Choose all correct answers.)

Out-of-band management tools do not provide access to the remote system’s BIOS or UEFI firmware.

Out-of-band management tools enable you to reinstall the operating system on a remote computer.

Telnet, Secure Shell (SSH), and Virtual Network Computing (VNC) are in-band management tools.

To perform out-of-band management on a device, it must have an IP address.

A

Out-of-band management tools enable you to reinstall the operating system on a remote computer.

Telnet, Secure Shell (SSH), and Virtual Network Computing (VNC) are in-band management tools.

Out-of-band management uses a dedicated channel to devices on the network. This means that the device to be managed does not require an IP address. The channel provides access to the BIOS or UEFI firmware and makes it possible to reinstall the operating system on a remote computer. Telnet, SSH, and VNC are not out-of-band management tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements best defines out-of-band management?

Out-of-band management is a method for accessing network devices from a remote location.

Out-of-band management is method for accessing network devices using a direct cable connection.

Out-of-band management is a method for accessing network devices using a connection to the system other than the production network to which the device is connected.

A

Out-of-band management is a method for accessing network devices using a connection to the system other than the production network to which the device is connected.

Out-of-band management refers to the use of an alternative channel to a network device. The channel can be a modem connection, a direct cable connection, a wireless or cellular connection, or a dedicated Ethernet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are the protocols that IPsec uses to secure network traffic? (Choose all correct answers.)

SSH

AH

ESP

SSL

A

AH

ESP

Authentication Header (AH) is an IPsec protocol that provides authentication and digital integrity services. Encapsulating Security Protocol (ESP) provides encryption services for IPsec. Secure Shell (SSH) is a remote administration tool, and Secure Sockets Layer (SSL) is a security protocol that provides encrypted communications between web browsers and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What four components are required for a computer to establish a remote Transmission Control Protocol/Internet Protocol (TCP/IP) connection?

Common protocols

Remote Access Service (RAS)

A physical layer connection

TCP/IP configuration

Point-to-Point Tunneling Protocol (PPTP)

Host and remote software

A

Common protocols

A physical layer connection

TCP/IP configuration

Host and remote software

A computer requires four components to establish a remote connection. First, a physical-layer wide area network (WAN) connection is needed. Second, two systems must share common protocols from the data link layer and above. Third, if TCP/IP is being used to establish a remote session, then TCP/IP parameters must be configured on the systems. Fourth, host and remote software are needed. The remote client must have software that enables it to establish a remote session, and the server must have software that allows it to receive and grant remote sessions. Microsoft RAS supports both client and server remote access software. However, this is not a required component since other types of software can be used. PPTP is a tunneling protocol and is not a required component for establishing a remote session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following protocols does IPsec use to digitally encrypt packets before transmitting them over the network?

ESP

SSL

AH

A

ESP

Encapsulating Security Protocol (ESP) is a protocol in the TCP/IP suite that is capable of providing encryption services for IPsec. Authentication Header (AH) provides digital integrity services for IPsec, in the form of a digital signature. Secure Sockets Layer (SSL) is a security protocol that provides encrypted communications between web browsers and servers. MSCHAP is an authentication protocol used by remote access services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following virtual private networking (VPN) protocols operate at the data link layer of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)

PPTP

L2TP

IPsec

SSL/TLS

A

PPTP

L2TP

Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) both operate at the data link layer. IPsec operates at the network layer, and Secure Sockets Layer and Transport Layer Security have functions that fall into the session and presentation layers

17
Q

Many virtual private networking (VPN) solutions use IPsec to encrypt traffic passing through tunnels. At which layer of the Open Systems Interconnection (OSI) model does IPsec function?

Data link

Network

Transport

A

Network

IPsec functions at the network layer of the OSI model, even though it frequently provides encryption for the Layer 2 Tunneling Protocol (L2TP), which operates at the data link layer

18
Q

Which of the following statements explains why web browsing over a client-to-site virtual private network (VPN) connection is usually so much slower than browsing locally?

The browser application is running on the VPN server.

The browser is using the remote network’s Internet connection.

The VPN tunnel restricts the amount of bandwidth available.

A

The browser is using the remote network’s Internet connection.

When you connect to a remote network using VPN, you become a participant on that network, which includes using the remote network’s Internet connection. Therefore, when you open a browser, the application passes your requests through the VPN tunnel to the remote server, which uses the default gateway and Internet connection at the remote site to connect you. This is inherently slower than connecting the browser directly to the Internet from your client computer

19
Q

In a site-to-site virtual private network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?

Two workstations

A workstation and a server

Two VPN concentrators

A

Two VPN concentrators

A site-to-site VPN connection connects two remote local area networks (LANs) together, enabling users on either network to access the other one. The typical configuration would consist of two VPN concentrators, one at each site, functioning as the endpoints of the connection

20
Q

In a client-to-site virtual private network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?

Two workstations

A workstation and a server

A workstation and a VPN concentrator

A

A workstation and a VPN concentrator

A client-to-site VPN connection connects a single workstation to a remote local area network (LAN), enabling the workstation user to access the remote network’s resources. The typical configuration would consist of a standalone workstation and a VPN concentrator at the network site functioning as the endpoints of the connection

21
Q

Which of the following are the two most common types of Secure Sockets Layer (SSL) virtual private network (VPN) connections? (Choose all correct answers.)

SSL client

SSL portal

SSL tunnel

SSL gateway

A

SSL portal

SSL tunnel

The two most common types of SSL VPN connection are SSL portals, which provide users with access to selected remote network resources through a standard website, and SSL tunnels, which require the client web browser to run an active control, typically using Java or Flash. SSL client and SSL gateway are not common SSL VPN connections

22
Q

In a host-to-host virtual private network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?

Two workstations

A workstation and a server

A workstation and a VPN concentrator

A

Two workstations

A host-to-host VPN connection connects two individual workstations at different locations, enabling the users on each workstation to access the other one through a secure tunnel. The typical configuration would consist of two workstations, one at each site, functioning as the endpoints of the connection

23
Q

Which of the following types of Secure Sockets Layer (SSL) virtual private network (VPN) connections provides the most comprehensive access to the remote network?

SSL client

SSL portal

SSL tunnel

A

SSL tunnel

The two most common types of SSL VPN connection are SSL portals, which provide users with access to selected remote network resources through a standard website, and SSL tunnels, which require the client web browser to run an active control, typically using Java or Flash. An SSL tunnel connection provides more complete access to the remote network. SSL client and SSL gateway are not common SSL VPN connections

24
Q

Many managed switches and routers include a console port for administrative access, to which you can connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?

Out-of-band

In-band

Client-to-site

A

Out-of-band

The term out-of-band is used to describe any type of management access to a device that does not go through the production network. Plugging a laptop into the console port avoids the network, so it is considered to be an example of out-of-band management. In-band management describes an access method that does through the production network. Client-to-site is a type of VPN connection, and Bring Your Own Device (BYOD) is a policy defining whether and how users are permitted to connect their personal devices to the network

25
Q

Which of the following statements about running a site-to-site virtual private network (VPN) connection to join two distant local area networks (LANs) together, rather than using a wide area network (WAN) connection, are generally true? (Choose all correct answers.)

The VPN is cheaper.

The VPN is slower.

The VPN is less secure.

The VPN is harder to maintain.

A

The VPN is cheaper.

The VPN is slower.

Because the two endpoints of a VPN are connecting to local Internet service providers (ISPs), the ongoing connection costs are typically much less than a long distance WAN connection. However, in most cases, a VPN is slower because it is affected by Internet bandwidth use and other factors. VPN connections are not inherently less secure than WANs, and they are not necessarily more difficult to maintain