Switch Features Flashcards

1
Q

Be sure to change the ___________ on your switches

A

default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is what you get when you chop up a broadcast domain and turn it into a bunch of little broadcast domains:

A

Virtual Lan ( VLAN )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

you can use a ________ to connect 2 VLAN’s

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Higher-end switches offer ____________routing

A

interVLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ routing acts like one or more virtual routers to connect multiple VLAN’s

A

interVLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

these ports move all VLAN traffic between switches

A

Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trunking is done by _____________ the ports

A

tagging, or Port Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ is a protocol to allow trunking on certain switches

A

802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a Cisco proprietary protocol that is used to automate the updating of all VLAN switches

A

VLAN Trunking Protocol (VTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The __________ command displays a switches running configuration

A

show config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___________ command displays the interfaces for all the ports.

A

show interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ are packets that are smaller than the required ethernet standard

A

runts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ are packets that are larger than the required Ethernet Standard

A

giants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___________ command displays the routing table on a Cisco switch

A

show route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ do not use IP addresses or work with Layer 3

A

switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ ___________ use STP to detect looping by deactivating the ports if necessary

A

Switch interconnections

17
Q

_____ _______ is a Cisco method allowing only non-switch devices to connect to the switch

A

BPDU guard

18
Q

_____ ________ links switch ports to increase bandwidth

A

Port Bonding

19
Q

Use _____ for the trunking protocol

A

LACP

20
Q

Set port to _________ __________ or _________ __________ or they wont work.

A

Active - Active
Active - Passive
setting them to just Passive won’t work.

21
Q

______ ___________ enables the traffic flowing through one port to be monitored on another port

A

Port mirroring

22
Q

The ________ ___________ feature enables admins to inspect traffic remotely from a suspect machine

A

Port mirroring

23
Q

_________ __________ is configured on a switch by providing a source port and a destination port.

A

Port mirroring

24
Q

_______ ___ __________ contols help you better manage available bandwidth

A

Quality of Service

25
Q

One type of QoS control is :

A

traffic shaping

26
Q

________ _______ on SOHO routers allows you to set priorities for different protocols

A

Simple QoS

27
Q

This system switch feature detects and reports possible attacks to the admins

A

Intrusion Detection Software (IDS)

28
Q

This switch feature system runs inline with the Network and acts to stop detected attacks.

A

Intrusion Prevention system (IPS)

29
Q

A firewall filters, an IDS notifies, an IPS acts to stop.

A
30
Q

this is a dedicated box or software
in an organization like schools
caching
has content filtering
acts like a firewall
hides the clients from the server

A

Forward Proxy Server

31
Q

this type of proxy doesn’t have to go through a bunch of configuration, has to be inline between you and the internet,

A

Transparent proxy

32
Q

this type of proxy is good for High Security
Handles DoS Attacks
Load balancing
Caching
Encryption acceleration
hide the server

A

Reverse Proxy Server

33
Q

Load balancing can be done with:

A

Can route the most available server, either by a configured list
DNS Severs - round robin
Server side - use clustering - uses a sophisticated hardware device that is located within the server.

34
Q

________ are used to protect public-facing servers by creating and isolated area for those devices.

A

DMZ’s

35
Q

Two ________ are used in a DMZ: one allowing unsolicited traffic to public service, and second maintaining isolation of the private network

A

firewalls

36
Q

________ _________ can be used to block specific access for areas that may need additional restrictions but, still function within the main domain

A

Internal firewalls