S8-Ethernet Switching Flashcards

1
Q

What is a Deterministic Network?

A

Network Access should be very Organized and Orderly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Contention-based Network?

A

a method where multiple devices compete for access to a shared resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CSMA/CD

A

“Carrier Sense Multiple Access with Collision Detections”

a network access method used in Ethernet networks to coordinate access to a shared medium,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is CS in CSMA/CD?

A

“Carrier Sensing”

Ethernet devices can listen to the network to determine if there is already a signal being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Carrier mean in electronics?

A

Refers to a signal that carries information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the MA in CSMA/CD?

A

“Multiple Access”

Many devices with the ability to access, listen on or transmit on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is CD in CSMA/CD?

A

“Collision Detection”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Random Backoff Timer

A

Collision resolution method where two devices pick a random timer and attempt retransmission once the timer hits 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Collision Domain?

A

a network segment where devices can potentially collide when transmitting data simultaneously on a shared medium, typically in half-duplex Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Role of an Ethernet Switch

A

Increases scalability of a network by creating multiple collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HUB

A

Layer 1 device that connects multiple network devices. acts as a multiport repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passive Hub

A

Repeats signal, no amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Hub

A

Repeats signal, With Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart Hub

A

Active hub with enhanced features eg.
- Simple Network management protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BRIDGE

A

Layer 2 Network device that makes intelligent forwarding decisions based on physical device addressing (MAC address).
- breaks up collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SWITCH

A

Layer 2 network devices that connects multiple network segments together. Acts like a multiport bridge making forwarding decisions based off of MAC addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a Switch behave?

A

Breaks up a collision domain by treating each port as it’s own collision domain w/ a bridge allowing for physical device addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ROUTER

A

Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information (IP Address)
- acts as a bridge between broadcast domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

L3 SWITCH

A

Switch that can make routing decisions and connects entire networks , not just network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does a L3 switch behave?

A

Each of its ports is treated as it’s own broadcast & collision domain w/ IP & MAC routing capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a VLAN?

A

“Virtual Local Area Network”

Logical subdivision of a given network that segments into separate broadcast domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What Layer does VLANs operate at?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some Benefits of a VLAN?

A
  • Enhanced Security
  • Improved Performance
  • Increased management
  • improved cost efficiency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does a VLAN enhance security?

A
  • segments network which isolates sensitive data and reduces data breaches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does a VLAN improve Performance?

A

Reduces the size of a broadcast domain, decreasing the amount of traffic being sent over that segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How does a VLAN increase Management?

A

Makes it easier to implement policies and troubleshoot issues.
each VLAN is treated as a separate network segment allowing for separate rules to be applied to different VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does a VLAN improve cost efficiency?

A

allows you to create separate logical networks using the same physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Where is the VLAN Database contained on a Cisco Switch?

A

in a Flat file called VLAN.DAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What type of information is contained within a VLAN database?

A
  • VLAN identifier
  • VLAN name
  • MTU size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is an SVI

A

“Switch Virtual Interface”

Allows switches to route traffic between different VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What some VLAN Configuration types?

A
  • 802.1Q Tagging
  • Native VLAN
  • Voice VLAN
  • Link Aggregation
  • Speed and Duplex Config
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is 802.1Q Tagging?

A

“VLAN Tagging”
Refers to the IEEE standard that facilitates the management of multiple VLANs on a single network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How does VLAN Tagging work?

A

A VLAN Tag containing a VLAN identifier (VID) is inserted into an Ethernet Frame that allows your switches to identify and forward the frames to the proper VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Trunking?

A

Transmission of traffic between different VLANs over the same physical network, while maintaining traffic from each VLAN separate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Native VLAN?

A

the VLAN that untagged traffic is assigned to when it enters a trunk port, allowing devices that don’t tag their traffic to still communicate on a network with VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a Voice VLAN?

A

Specialized VLAN dedicated to voice traffic (VoIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Why is Voice VLAN important?

A

Ensures the Quality and reliability of voice communication is upheld by separating voice traffic out from your regular traffic.
- Voice traffic is sensitive to delays and packet loss

38
Q

what is a QoS policy?

A

“Quality of Service”

Set of rules that aim to guarantee the performance of specific network traffic (e.g., voice, video, data) by assigning priorities and allocating bandwidth accordingly.

39
Q

What is Link Aggregation?

A

“Port Channeling/Bonding”

Method used in networks to combine multiple connections into a single, logical link

40
Q

Purpose of Port Bonding?

A

Combines multiple network links so that data can be distributed across multiple links to utilize the combined bandwidth of all those links.
- used to support Trunking lines between switches

41
Q

How does port bonding provide redundancy and resiliency?

A

Allows network traffic to flow over the remaining links if one of the bonded links fails.

42
Q

What are Speed & Duplex Configurations?

A

Speed
- Rate of data transfer in Mbps/Gbps

Duplex
- Mode of communication Half or Full

Half - send OR receive
Full - send AND receive

43
Q

What is Auto-Negotiation?

A

Devices automatically select the highest performance settings in common

44
Q

Spanning Tree Protocol (802.1d)

A

Network protocol that prevents looping of network traffic and permits redundant links between switches

45
Q

what is a Broadcast Storm?

A

A situation where a large number of broadcast packets flood the network, overwhelming switches and endpoints.

46
Q

What is a Switching loop?

A

Occurs when there are multiple paths between network devices, creating a cycle where data packets endlessly circulate.

47
Q

How does STP prevent Looping?

A

Root Bridge
Non-root Bridge

48
Q

Root Bridge

A

A switch is elected to act as a reference point for the entire spanning tree.

49
Q

Which switch is selected to act as a Root Bridge?

A

Switch with the lowest Bridge ID (BID)

50
Q

what is in a Bridge ID (BID)?

A

A priority value and a Mac address

51
Q

What is a Non-Root Bridge?

A

All other switches in an STP topology

52
Q

What is a Root Port?

A

a port on a non-root bridge switch that offers the shortest path to the root bridge, and is always in a forwarding state.

53
Q

What is a Designated Port?

A

Closest port to the root bridge on a network segment.

54
Q

in STP what are the ports on the Root Bridge considered?

A

All the ports on a Root Bridge are designated ports

55
Q

What are Non-Designated Ports?

A

Ports that block traffic to create loop-free topology

56
Q

How do Non-designated ports receive Data?

A

As a Bridge Protocol Data Unit (BPDUs)

57
Q

What Transitions does a Non-designated port make to reach a forwarding state?

A
  • blocking
  • listening
  • learning
  • forwarding
58
Q

Blocking state

A

BPDUs Received, but not forwarded

59
Q

Listening State

A

populates the MAC Address table, but does not forward frames

60
Q

Learning State

A

Processes BPDUs and Determines role within the spanning tree

61
Q

Forwarding State

A

Forwards Frames for operations

62
Q

what is Link Cost?

A

Priority value given to a link based on the speed of that link.
- Faster link = lower cost

63
Q

What is NAC?

A

“Network Access Control”

Method for increasing network security by inspecting devices connecting to the network. (Network customs)

64
Q

What are parts of a NAC inspection process?

A
  • Port Security
  • MAC Filtering
  • 802.11x Authentication
65
Q

Port Security

A

Securing Physical network ports to prevent unauthorized access

66
Q

MAC Filtering

A

Limits network access based on Physical Device addressing (MAC Address)

67
Q

Allowlisting

A

Allows specified devices, blocks the rest
- more secure

68
Q

Blocklisting

A

Blocks specified devices, allows the rest
- less secure

69
Q

802.1x Authentication

A

Network Authentication framework that ensures only authenticated users access network services.

70
Q

How does 802.1x work?

A

Works by encapsulating Extensible Authentication Protocol (EAP) within your network’s frames.

  • enables the use of various authentication methods eg. Usernames & Passwords, Smart cards, digital certificates etc.
71
Q

What 3 components are involved in the 802.1x process?

A
  • Supplicant
  • Authenticator
  • Authentication server
72
Q

Supplicant

A

User Device seeking to access the network

73
Q

Authenticator

A

Network device the user wants to connect to

74
Q

Authentication Server

A

Server on the network that will authenticate the user’s device

75
Q

What Agents are used to check each device that connects to the network?

A
  • Persistent Agents
  • Non-persistent Agents
76
Q

Persistent Agents

A

Software that Can continuously monitor and enforce compliance with an organization’s security policies

  • usually installed on company owned devices
77
Q

Non-persistent agents

A

Allows users to connect to the network and access a captive portal which then asks the user to run a temporary agent that assesses the device’s compliance and then removes itself.

  • usually installed on user’s personally owned devices
78
Q

What are some ways NACs can be tailored?

A
  • Time-based
  • Location-based
  • Role-based
  • Rule-based
79
Q

Time-based

A

Regulates access to specified hours

80
Q

Location-based

A

Regulates access based on verified physical location

81
Q

Role-based

A

Regulates access based on the user’s role within an Org.

82
Q

Rule-based

A

Regulates access based on a set of predefined rules

83
Q

What is an MTU?

A

“Maximum Transition Unit”

Largest size of a data packet or frame that can be sent over a network.
- Max load cap. for frames inside a network

84
Q

What is the standard MTU size for Wired Ethernet?

A

1500 bytes

85
Q

What is it recommended to configure a smaller MTU size?

A
  • Wireless Networks
  • VPN connections (1400-1450 bytes)
  • PPPoE connections (1400-1420 bytes)
86
Q

What are JUMBO Frames?

A

Frames that exceed the standard ethernet MTU size of 1500 bytes.

87
Q

What is the default size of a JUMBO Frame?

A

9000 bytes

88
Q

Why are JUMBO frames beneficial?

A

more data can be moved inside of a single frame
- reducing overhead,
- reduce switch processor load
- improve data transfer and throughput speeds.

89
Q

Where are JUMBO Frames ideal?

A
  • High-bandwidth Applications
  • Storage are networks
  • Large File transfers
  • Video Streaming
  • Server-Server communications
90
Q

What is Fragmentation in JUMBO Frames?

A

When a Jumbo frame encounters a network segment with a smaller MTU size, the frame will have to be split up into smaller frames.

91
Q

Potential Drawbacks of JUMBO Frames

A
  • Misconfiguration
  • Fragmentation
  • Harder to troubleshoot