Wszystko Do Jednego Kotla Flashcards
Co wiesz o smtp
Wysyłanie maili między serwerami
Wysyłanie maili z urządzeń klienta
Z charakteryzuj T F T P
Bardzo podstawowy protokół wymiany plików i nie zapewnia security features czytam obrony ochrony plików przesyłu danych
Co wiesz o IMAP cztery
Spełnia tą samą tą samą funkcję co pop trzy ale też zapewne więcej czyli to jest taka lepsza wersja tego po trzy i to jest generalnie lepsza wersja pop3
Protokół zarządzania systemami sieciowymi do monitorowania dołączonych do sieci urządzeń
SN MP
Ldap to przykład jakiego protokołu
Directory access protocol
Scharakteryzuj smb i cifs
Zapewnia dostęp do plików folderów i urządzeń oraz używany głównie na windowsie
Taki protokół jak team sy że tam jest głos wideo application and sharing instante message and Services czy jakieś czaty pewnie
Sip (siup bo na callach się pije)
Co zapewniają headery ah oraz esp
Ah uwierzytelnianie
Esp CIA (Confidentiality…)
Tryb ipseca do szyfrowania
Tunneling
Tryb ipsec do szyfrowania samych danych
Transport
Co robi hub
Takie gowienko do łączenia wielu rzeczy w topologii gwiazdy
Tak się nazywają dane na poziomie TCP?
Segment
Nazwa danych na poziomie udo
Datagram
Podaj przykłady protokołów warstwy aplikacji
HTTP SMTP ftp
Wymień i opisz funkcje warstw modelu osi
No opisuj xd
Od czego jest rekord A w dnsie
Adresy ipv4
Od czego jest rekord AAAA w dnsie?
Ipv6
Co to stratum?
Dokładność zegara w kontekscie ntp. Stratum 0 to gpsy czy zegary atomowe, 1 synchronizuje się do 0 i tak dalej.
Contemporary
Wspolczesny
Jaki rodzaj topologii jest najczęściej używany w LAN?
Star topology
Czy architektura klient- serwer jest bardziej solidna (reliable) niż architektura peer2peer?
Nie, jest mniej niezawodna, coś się zepsuje i dupa
Jaka sieć to połączenie paru LANów!
CAN
xxx - protokół sieciowy oryginalnie zaprojektowany przez firmę IBM. Zapewnia podstawowy interfejs łączenia aplikacji z innymi aplikacjami w innych komputerach znajdujących się w tej samej sieci lokalnej oraz umożliwia współdzielenie danych. xxx działa w 5. warstwie (sesji) modelu OSI.
NetBIOS
Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply)
ATM
HTTP
FTP
IP
SMTP
TCP/UDP
HTTP, FTP, SMTP
xxx is a telecommunications standard defined by American National Standards Institute (ANSI) and ITU-T (formerly CCITT) for digital transmission of multiple types of traffic.
ATM
xxx is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces
HIDS (host-based intrusion detection system)
Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet?
VPN headend
Proxy server
Distributed switch
UTM appliance
VPN headend
Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet?
VPN headend
Proxy server
Distributed switch
UTM appliance
VPN headend
xxx allow different hosts to use the switch as long as they exist within the same host cluster.
Distributed switch
xxx is a hardware device that plugs in to your organization’s network at the network perimeter. It serves as a gateway onto your corporate network, providing all the security services you need to protect your network from malware, unauthorized intrusion, and other security risks. Key word here is unified
UTM appliance
Which of the following terms refers to an environmental control system?
SCADA
HIPS
TEMPEST
HVAC
HVAC
xxx - system informatyczny nadzorujący przebieg procesu technologicznego lub produkcyjnego. Jego główne funkcje obejmują zbieranie aktualnych danych (pomiarów), ich wizualizację, sterowanie procesem, alarmowanie oraz archiwizację danych.
xxx is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and other devices, such as programmable logic controllers, which interface with process plant or machinery.
SCADA
xxx to zainstalowane bezpośrednio na urządzeniu końcowym oprogramowanie, które monitoruje pojedynczy host pod kątem podejrzanej aktywności, analizując zdefiniowane zdarzenia występujące na tym hoście.
HIPS
Host-based Intrusion Prevention System
Bo hips don’t lie i jest dobry do monitorowania
EDR
Endpoint detection and response
xxx is computer software used to manage the creation and modification of digital content (content management)
CMS
content management system
xxx is an electronic control system and associated instrumentation used for industrial process control
ICS
Industrial control system
xxx is used for managing mobile devices
MDM
mobile device managment
xxx allows routes from one routing protocol to be advertised in another routing protocol.xxx is common in environments that support legacy equipment, proprietary protocols, or that have merged with other networks using a different routing protocol.
Czyli wymiana opinii między protokołami.
Route redistribution
xxx is used to combine a set of more specific routes into a single more general route.
This reduces the number of routes advertised by a given protocol.
Route aggregation
Automatic routing table update is a feature of:
Static routing
Route redistribution
Dynamic routing
Route aggregation
Dynamic routing (sprawdz to ziom!)
Which of the following answers refers to a link-state routing protocol?
BGP
EIGRP
RIP
OSPF
OSPF
xxx care more about speed of connection that number of hops
link-state routing protocols
xxx and yyy are examples of distance-vector routing protocols
RIP and EIGRP
BGP (baldur’s gate protocol :) ) is an example of…
Hybrid routing protocols (hybrydowe, bo jedynka ok, ale dwójeczka wybitna)
The term “Default route” refers to a “last resort” network path used by a router for forwarding all packets with destination addresses not listed in its routing table.
True
False
True
In routing, the term “Administrative distance” refers to a value used in routers to rank routes from most preferred (high AD value) to least preferred (low AD value).
True
False
W sumie imo true
Which of the following is an exterior gateway protocol?
OSPF
BGP
EIGRP
RIP
BGP (border, ale jednocześnie jedyny exterior)
xxx is a Routing Protocol which is used to find network path information between different networks. It is commonly used in the Internet to exchange routing table information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems. xxx is the only xxx at the time.
Exterior Gateway Protocol (EGP)
Border Gateway Protocol (BGP)
Exterior Gateway Protocol (EGP)
Which of the following answers refer(s) to (an) interior gateway protocol(s)? (Select all that apply)
RIP
EIGRP
BGP
OSPF
RIP
EIGRP
OSFP
An xxx or xxx is a type of routing protocol used for exchanging routing table information between gateways (commonly routers) within an autonomous system (for example, a system of corporate local area networks).
interior gateway protocol (IGP)
Interior routing protocol
ich przykłady to ospf, rip, eigpr
A field in an IP datagram that specifies how many more hops a packet can travel before being discarded is called:
SPB
TTL
MTU
VTC
TTL
xxx is a value how fat packets/data units can be
MTU
xxx is a technology that facilitates the communication and interaction of two or more users through a combination of high-quality audio and video over Internet Protocol (IP) networks. Such setups are highly useful in business and enterprise computing because they simulate real and face-to-face communication over sophisticated digital platforms and established telecommunication networks.
Video teleconferencing (VTC)
xxx, specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing.
Shortest Path Bridging (SPB)
Which of the following terms refer to solutions used for controlling network resources and assigning priority to different types of traffic? (Select 2 answers)
Acceptable Use Policy (AUP)
Packet shaping
Bandwidth cap
Quality of Service (QoS)
Fair access policy
Packet (sometimes also traffic) shaping
Quality of Service (QoS)
xxx, acceptable usage policy or fair use policy is a set of rules applied by the owner, creator or administrator of a computer network website, or service. That restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used.
An acceptable use policy (AUP)
xxx is a limit placed on the size and speed of data transfers by an Internet service provider (ISP).
A bandwidth cap
Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?
- Honeynet
- Virtual Private Network (VPN)
- Demilitarized Zone (DMZ)
- Virtual Local Area Network (VLAN)
- SNMP community
VLAN
xxx is a network set up with intentional vulnerabilities hosted on a decoy server to make hackers fall into a trap
Honeynet (honeypot podobna rzecz)
xxx is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a xxx is to add an additional layer of security to an organization’s local area network (LAN): an external network node can access only what is exposed in the xxx, while the rest of the organization’s network is firewalled. The xxx functions as a small, isolated network positioned between the Internet and the private network.
DMZ (demilitarized zone)
Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often referred to as “trunking” or “VLAN multiplexing”, and each of the switches has a special port (trunk port) configured to pass all the data, regardless of the VLAN number, between all switches on a LAN. To allow for multiple VLANs on one link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header labeling it as belonging to a certain VLAN.
True
False
True
xxxx will combine multiple physical ports into one logical one.
Link Aggregation Control Protocol (LACP)
xxx is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of xxx is to prevent bridge loops and the broadcast radiation that results from them. xxx also allows a network design to include backup links providing fault tolerance if an active link fails.
STP (spanninf tree protocol) (zalatuje grafami :D )
Virtual Router Redundancy Protocol (VRRP) in an example of…
Multicast protocol
HSRP, VRRP, GLBP are examples of …
Gateway redundancy protocols
xxx are used to create virtual routers which virtually group many physical routers into one and in case of one router fails, another router will take it’s job. All hosts are assigned to a virtual router and have no idea of physical devices and one of them eventually failing
Gateway redundancy protocols
In the context of implementing secure network designs, the term “Port security” may apply to:
Disabling physical ports on a device (e.g. RJ-45 device ports on a router, switch, or patch panel)
Implementing MAC address filtering
Disabling unused logical ports (TCP/UDP)
Implementing Port-based Network Access Control (defined in the IEEE 802.1X standard)
All of the above
All of the above
Port mirroring allows an administrator to inspect traffic passing through a network switch. On a switch that supports port mirroring, a packet analyzer can be connected to an empty port and the switch can be configured to pass a copy of the data sent over one or multiple ports on that switch to the packet sniffer port allowing the administrator to monitor contents of the traffic passing through the switch.
True
False
True
Transmission carried out in one direction only is described as simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.
True
False
True
Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often referred to as “trunking” or “VLAN multiplexing”, and each of the switches has a special port (trunk port) configured to pass all the data, regardless of the VLAN number, between all switches on a LAN. To allow for multiple VLANs on one link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header labeling it as belonging to a certain VLAN.
True
False
True
The term “VoIP endpoint” refers to a dedicated hardware device or an application program that enables Voice over Internet Protocol (VoIP) telephone calls from computing devices.
True
False
True
xxx is an extensible web server software created by Microsoft for use with the Windows NT family.[2] IIS supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and NNTP.
Internet Information Services (IIS, formerly Internet Information Server)
TCP port 389 is the default network port for:
RDP
LDAP
SMB
LDAPS
LDAP
RDP uses tcp/udp port number xxx
3389
SMB uses tcp/udp port number xxx
445
LDAPS uses tcp/udp port number xx
636
https uses port tcp/udp number xx
443
Which of the following protocols runs on TCP port 445?
HTTPS
SMB/CIFS
IMAP
H.323
SMB/CIFS
Which of the following ports is used by syslog?
445
514
587
636
514 (both tcp or udp)
Where is port number 587 used?
SMTP (communication between servers)
A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection?
TCP port 1720
TCP port 636
TCP port 3389
TCP port 445
TCP port 3389
Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers)
UDP port 67
TCP port 5060
TCP port 389
UDP port 68
TCP port 5061
TCP port 3389
TCP port 5060
TCP port 5061
Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
CCMP
RSTP
ICMP
SNMP
ICMP
RSTP is an extension on protocol xxx
STP
CCMP is and ___ protocol
encryption
routing
mail
access directory
encryption
CCMP is and ___ protocol
encryption
routing
mail
access directory
encryption
Which of the following answers refers to a tunneling protocol?
VRRP
GRE
RTSP
BGP
GRE
A computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
RSTP
GRE
CRRP
IMAP
CRRP
An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is known as:
6to4
Teredo
eDiscovery
Miredo
Teredo
xxx is a Teredo tunneling client designed to allow full IPv6 connectivity to computer systems which are on the IPv4-based Internet but which have no direct native connection to an IPv6 network.
Miredo
xxx is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network. Unlike similar protocols, it can perform its function even from behind network address translation (NAT) devices such as home routers.
Teredo
xxx is an Internet transition mechanism for migrating from Internet Protocol version 4 (IPv4) to version 6 (IPv6) and a system that allows IPv6 packets to be transmitted over an IPv4 network (generally the IPv4 Internet) without the need to configure explicit tunnels. Special relay servers are also in place that allow xxx networks to communicate with native IPv6 networks.
6to4
What is the difference between 6to4 and Toredo?
Toredo changes IPv4 to IPv6
Toredo, unlike 6to4 can perform its function even from behind network address translation (NAT) devices such as home routers
Toredo isn’t IP protocol
Toredo, unlike 6to4 can perform its function even from behind network address translation (NAT) devices such as home routers
What does the term “Miredo” refer to?
IPv4 to IPv6 migration mechanism
Load balancing solution
Teredo tunneling software
Content filtering solution
Teredo tunneling software
The term “Dual-stack IP” refers to a solution that relies on implementing both IPv4 and IPv6 protocol stacks on various network devices to facilitate seamless migration from IPv4 to IPv6.
True
Which of the following answers lists a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?
FE80:00A7::2AA:0:4C:FE9A
FE80:A7::2AA::4C00:FE9A
FE80:00A7::2AA:0:4C00:FE9A
FE80:A7::2AA:0:4C00:FE9A
FE80:A7::2AA:0:4C00:FE9A
An IPv6 protocol used by routers to advertise their presence on a network is called:
NDR
NCP
NDP
NTP
NDP
NDR stands for ___
Network detection and response
xxx was software that ran on a 37xx communications controller and managed communication with remote devices. NCP provided services comparable to the Data Link Layer and Network Layer functions in the OSI model of a Wide area network.[1]
NCP
Which of the following allows a network node to autoconfigure an IPv6 address in the absence of a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server?
APIPA
CIDR
NetBEUI
SLAAC
SLAAC
xxx is a method for allocating IP addresses and for IP routing without classes
CIDR
xxx metoda, która umożliwia komputerowi przypisanie sobie adresu IP wówczas, gdy serwer DHCP jest niedostępny lub nie istnieje w danej sieci. Metoda ta znacznie ułatwia konfigurowanie i obsługę niewielkiej, prostej sieci lokalnej (LAN, Local Area Network), w której jest używany protokół TCP/IP. Działa zarówno w IPv4 jak i IPv6
APIPA
xxx metoda, która umożliwia komputerowi przypisanie sobie adresu IP wówczas, gdy serwer DHCP jest niedostępny lub nie istnieje w danej sieci. Metoda ta znacznie ułatwia konfigurowanie i obsługę niewielkiej, prostej sieci lokalnej (LAN, Local Area Network), w której jest używany protokół TCP/IP. Działa zarówno w IPv4 jak i IPv6
APIPA
is a mechanism that enables each host on the network to auto-configure a unique IPv6 address without any device keeping track of which address is assigned to which node.
SLAAC
Stateless Address Autoconfiguration - stateless, czyli nikt nie śledzi tego, kto ma jaki numer ip, które adresy wolne i które zajęte
An IP address that doesn’t correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).
True
False
True
What is the function of FTP?
Email service
Directory access
Serving of web pages
File exchange
File exchange
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
TFTP
SSH
Telnet
RDP
SSH
A network protocol for secure file transfer over Secure Shell (SSH) is called:
TFTP
SFTP
Telnet
FTPS
SFTP
Telnet: (Select 3 answers)
Encrypts network connection
Provides username & password authentication
Transmits data in an unencrypted form
Does not provide authentication
Enables remote login and command execution
Provides username & password authentication
Transmits data in an unencrypted form
Enables remote login and command execution
The SMTP protocol is used for: (Select 2 answers)
Sending email messages between mail servers
Name resolution services
Serving of web pages
Retrieving email messages from mail servers
Sending email messages from a client device
Sending email messages between mail servers
Sending email messages from a client device
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
TCP/IP
DNS
SQL
DHCP
DNS
xxx is a method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device
NAT (network address translation)
Na przykład wychodzisz na router na świat i nie używasz swojego lokalnego adresu ip 192.168.0.50
What are the characteristic features of TFTP? (Select 2 answers)
Provides no security features
Typically used for exchanging files over the Internet
A very basic form of file sharing protocol
Provides authentication and encryption
Directory access protocol
Provides no security features
A very basic form of file sharing protocol
Which network protocol enables retrieving contents of an Internet page from a web server?
SNMP
HTTP
SMTP
IMAP
HTTP
POP3 is used for:
Name resolution
Sending email messages
File exchange
Email retrieval
Email retrieval
Which protocol is used in VLAN trunking?
NTP
VTP
NNTP
RTP
VTP
xxx is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features.
RTP
(real time protocol)
Which of the following answers refer to IMAP4? (Select 2 answers)
Offers improved functionality in comparison to POP3
Serves the same function as POP3
Enables sending email messages from client devices
Offers less functions than POP3
Enables email exchange between mail servers
Serves the same function as POP3
Offers improved functionality in comparison to POP3
A type of protocol used in network management systems for monitoring network-attached devices is called:
SMB
NTP
SNMP
RDP
SNMP
Which type of server is used for collecting diagnostic and monitoring data from networked devices?
Proxy server
UC server
Syslog server
ICS server
Syslog server
SMTP TLS runs on port:
445
514
587
636
587
Which of the following answers lists a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?
FE80:00A7::2AA:0:4C:FE9A
FE80:A7::2AA::4C00:FE9A
FE80:00A7::2AA:0:4C00:FE9A
FE80:A7::2AA:0:4C00:FE9A
FE80:A7::2AA:0:4C00:FE9A
xxx is a cloud computing offering where a service provider delivers virtual desktops to end users over the Internet, licensed with a per-user subscription.
DaaS
Which cloud service model would provide the best solution for a web developer intending to create a web app?
DaaS
SaaS
PaaS
IaaS
Which of the following answers refers to a cloud-based VDI service?
IaaS
PaaS
DaaS
SaaS
DaaS
xxx is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
Desktop virtualization VDI
A DevOps practice that replaces manual configuration of hardware with automatic deployment through code is called:
IaC
Virtualization
PaaS
VDI
IaC
A DevOps practice that replaces manual configuration of hardware with automatic deployment through code is called:
IaC
Virtualization
PaaS
VDI
IaC
xxx is the ability of network infrastructure to connect with a wide variety of devices, including thin and thick clients, such as mobile phones, laptops, workstations, and tablets, to enable seamless access to computing resources across these diverse platforms. It is a key characteristic of cloud technology.
Broad network (access)
xxx is a delivery model in which a utility provider monitors how much of a particular service each customer consumes within a designated time period. Measured services give the provider insight into resource consumption and provide customers with transparency into how they are billed for the services they consume.
Measured service
xxx refers to the service provided by cloud computing vendors that enables the provision of cloud resources on demand whenever they are required
On-demand self service
In cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:
Broad network access
Measured service
On-demand self-service
Resource pooling
Resource pooling
Which of the following terms refers to a cloud computing feature that allows for automatic allocation of computing resources in proportion with the demand?
Rapid elasticity
Measured service
On-demand self-service
Resource pooling
Rapid elasticity
A device designed to filter and transfer data packets between dissimilar types of computer networks is called:
Hub
Load balancer
Router
Switch
Router
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance.
Router
Switch
Bridge
Hub
Hub
xxx is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources.
A captive portal
A welcome webpage
A welcome portal
a captive webpage
A captive portal
A place where u connect many cables is…
Connection point
Intermediate Distribution Frame (IDF)
Distribution box
Intermediate Distribution Frame (IDF)
What is the difference between active and passive hub?
Active hub amplifies (wzmacnia) signal.
Bridge is a hardware-based device.
True
False
False, bridge forwards using software
Bridge has only 2 ports and switch has many.
True
False
True
We use switches to connect two LANs.
True
False
False
Switches are used to connect many hosts.
True
False
True
Which of the following answers describe the features of a network bridge? (Select 3 answers)
Makes forwarding decisions in hardware (ASIC)
Newer and more effective type of network device in comparison to network switch
Typically capable of connecting more network segments than switch (more physical ports)
Makes forwarding decisions in software
Typically capable of connecting fewer network segments than switch (fewer physical ports)
Older and less effective type of network device in comparison to network switch
Makes forwarding decisions in software
Typically capable of connecting fewer network segments than switch (fewer physical ports)
Older and less effective type of network device in comparison to network switch
What are the characteristic traits of a network switch? (Select all that apply)
Makes forwarding decisions in hardware (ASIC)
Typically capable of connecting more network segments than bridge (more physical ports)
Older and less effective type of network device in comparison to network bridge
Makes forwarding decisions in software
Sometimes referred to as multiport bridge
Newer and more effective type of network device in comparison to network bridge
Typically capable of connecting fewer network segments than bridge (fewer physical ports)
Makes forwarding decisions in hardware (ASIC)
Typically capable of connecting more network segments than bridge (more physical ports)
Sometimes referred to as multiport bridge
Newer and more effective type of network device in comparison to network bridge
Which network device enables centralized management of WAPs?
VPN concentrator
Load balancer
Multilayer switch
Wireless LAN controller
Wireless LAN controller
A xxx is a networking device that creates and helps to manage multiple VPN connections remotely. It establishes multiple encrypted VPN tunnels at the same time and provides a secure and encrypted connection between different VPN nodes.
VPN concentrator
Can mulitilayer switches work in 4-7 OSI model layers?
Yes
No
Yes, for example load balancers (mam poczucie, że to jest mocno dyskusyjne w kwestii nazewnictwa w ogóle)
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Bridge
Active hub
Server
Proxy
Proxy
Which of the answers listed below apply to DSL modems? (Select 3 answers)
Dedicated bandwidth
Cabling that carries TV signals
Shared bandwidth
Twisted-pair copper cabling
Telephone lines
Coaxial cabling
Dedicated bandwidth
Twisted-pair copper cabling
Telephone lines
In computer networking, the term “Attenuation” refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path. The problem of attenuating circuit on the network can be solved by adding a device that boosts the signal strength. This type of device is known as:
Repeater
Media converter
Inverter
Load balancer
Repeater
Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service, also known as Plain Old Telephone Service (POTS). A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office. VoIP endpoints are specialized hardware devices or application programs that enable VoIP calls from computing devices. VoIP gateways are network devices that convert voice and fax calls, in real time, between an IP network and PSTN/POTS.
True
False
True
Media converters are devices that allow for connecting different types of incompatible media such as copper and fiber-optic cabling.
True
False
True
Which of the following answers illustrates the difference between passive and active network security breach response?
HIPS vs. NIPS
UTM vs. Firewall
NIPS vs. UTM
IDS vs. IPS
IDS vs. IPS
Tell me abou the difference between IPS (Intrusion Prevention System) and IDS (Intrusion Detection System)
IDS just detects, IPS detects and blocks
xxx is a rdp feature forcing users to authenticate before establishing session
NLA (network level authentication)
An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:
Captive portal
Access Point (AP)
Intermediate Distribution Frame (IDF)
Active hub
Access Point (AP)