Networking Basics and Terminology Flashcards
Which network device transmits data between different networks by examining the destination network address in a packet?
Load balancer
Layer 2 switch
Router
Router
Routers examine the destination network address when receiving inbound traffic to transmit packets to different networks
You have been asked to implement a router-based solution that allows inbound SSH traffic from a specific subnet. What should you configure?
NIC
ACL
Proxy
ACL
Access control lists (ACLs) determine what network traffic is allowed to flow through a router
A busy web site has not been responding well because of the large volumes of HTTP connections to the web server. Which solution would increase web server performance?
Add more RAM to the web server.
Install two web servers hosting the same content. Configure a load balancer to distribute incoming HTTP connections between the two web servers.
Place a router between the web server and the Internet to throttle incoming HTTP connections.
Install two web servers hosting the same content. Configure a load balancer to distribute incoming HTTP connections between the two web servers.
Configuring multiple servers behind a load balancer allows for the distribution of incoming network traffic among those servers
Which router security feature drops inbound traffic with a forged source address of an internal network?
Stateless packet inspection
Anti-malware
Anti-spoofing
Anti-spoofing
Anti-spoofing checks that the source IP of external traffic coming into a network does not match the IP range of an internal network; otherwise, this implies that the source IP address has been spoofed and should be dropped
Your web application consists of two back-end servers fronted by a load balancer. As client requests come in you would like the first request to be sent to the first server, the next request to the second, and so on, in a circular pattern. Which load balancer scheduling algorithm should you configure?
Round robin
Weighted round robin
Random
Round robin
Round robin sends traffic to the first back-end node, then the second, the third, back to the first, and so on
During an IT meeting, your colleague Raylee suggests that there is a single point of failure in the single load balancer in place for the company web site ordering system. She suggests having two load balancers configured, with only one in service at a given time. What type of load balancing configuration has Raylee described?
Round robin
Active-active
Active-passive
Active-passive
Active-passive configurations consist of two load balancers, one of which is active. When the active load balancer is unresponsive, the second load balancer takes over
An active-passive load balancer solution is configured on your network. When the standby load balancer determines that the primary load balancer is down, what attribute does it take control of?
Load balancer MAC address
Load balancer IP address
First back-end server MAC address
Load balancer IP address
A virtual IP address is assigned to the active load balancer. This is the externally exposed addresses the DNS names must resolve to
Which of the following statements regarding router ACLs is true?
Rules are processed in a top-down fashion.
Rules are processed in a bottom-up fashion.
The first rule should be a deny-all rule.
Rules are processed in a top-down fashion.
Router ACL rule sets are processed in a top-down fashion. If no rules are matched, then the last rule applies
When writing router ACL rules, which general guideline should be followed?
Do not block traffic based on IP addresses.
The first rule should be a deny-all rule.
The last rule should be a deny-all rule.
The last rule should be a deny-all rule.
If there are no ACL rule matches, the last rule (deny all) will be applied to traffic
Your network requires routers that can block traffic based on the MAC address. What type of ACL rule support must routers support?
Layer 1
Layer 2
Layer 3
Layer 2
Layer 2 of the OSI model deals with MAC, or hardware, addresses
As part of a network security team, you need to capture network transmissions to and from all hosts on an Ethernet network switch. However, after plugging into switch port 24 and beginning a packet-capturing session, you see only broadcast and multicast transmissions from other hosts. What must you do?
Plug into switch port 1.
Configure switch port monitoring on port 24.
Configure switch port monitoring on port 1.
Configure switch port monitoring on port 24.
Most switches have a port-monitoring option whereby all switch traffic is copied to the specified port, in this case, port 24
Which type of network device results in additional broadcast domains?
Hub
Layer 2 switch
Router
Router
Routers result in multiple broadcast domains; in other words, broadcast transmissions do not traverse routers
IT staff stations initiate a large volume of network traffic to and from server 1 and server 2. All staff stations are plugged into four switches that are linked together. What should be done to make more efficient use of network bandwidth?
Place IT staff stations and the servers on their own VLAN.
Place server 1 and server 2 on separate VLANs.
Place a router between IT staff stations and the servers.
Place IT staff stations and the servers on their own VLAN.
Placing IT staff stations and servers 1 and 2 on their own VLAN keeps their traffic isolated from the rest of the network
Which of the following is Telnet used for?
Verifying routers in a transmission path
Performing encrypted remote command-line management
Performing clear-text remote command-line management
Performing clear-text remote command-line management
Telnet uses TCP port 23 and is used for clear-text remote command-line management
Which network protocol is not routable?
HTTP
DNS
NetBIOS
NetBIOS
NetBIOS is not a routable network protocol. NetBIOS over TCP/IP (NBT) is a Microsoft protocol used in the past for purposes such as file and print sharing over port 139