Week 2 Flashcards
What is a logical subgroup within a LAN that is created via software?
VLAN
What is combining multiple physical links between two switches into one logical link called?
Link aggregation
What controls link aggregation?
Link aggregation control protocol
What is the biggest way to protect against unauthorized connections to a switch?
MAC filtering
What does STP prevent?
-Broadcast storm
-switching loops
Within layer 2 networks
What are the three types of access for remote access?
- admin access
- end user access
- limited (general) access
What type(s) of VPN is transparent to servers?
Host-to-Gateway
Gateway-to-Gateway
What type(s) of VPN is transparent to users?
Gateway-to-Gateway
What type(s) of VPN(s) protects VPN endpoints?
- host to host
- host to gateway
- gateway to gateway
What are the two forms of full virtualization?
- bare metal
- hosted solution
What VLAN do you NOT use?
VLAN 1
What do you use to create and run VM’s?
VSphere
What is the function of VMKernel?
Run VM’s and manages host physical resources
What are some threats to a VM?
- malicious insiders
- hijacked service accounts
- unknown risks of application being used with service
- misconfigurations
How do you secure the OS?
- follow the STIG guidance
- install updates
- monitor the network
- delete unused VM’s
What do you NOT use for backups?
Snapshots
The MAC address change policy is set to what? To prevent?
- reject
- MAC spoofing
What partitions server resources?
VMKernel Resource Manager
What do routers do?
They are networking devices that forward, filter, and flood packets between networks.
When you use the AAA banner, what would you see?
AAA Auhentication
What banner would you see after logging in for shell prompt?
EXEC
What is an ACL?
Log, deny traffic
Handles network traffic
How do you read an ACL?
From the top down
What mode do you create an ACL in?
Global config mode
Two types of ACLs.
Standard
Extended
Three types of router logs
AAA logs
SNMP logs
System logs