CH11 - Course Quiz Flashcards

1
Q

In DNS Load Balancing, all Web Servers share the same IP Address?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?

port mirroring
proxying
port blocking
port authentication

A

port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order for a VLAN to get its name, what is typically appended to the word “VLAN”?

a slash
a number
an IP Address
a MAC Address

A

a number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a Network?

promiscuous
transparent
server
client

A

promiscuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which trunk standard enables you to connect switches from different manufacurers?

IEEE 802.11
IEEE 802.1Q
IEEE 802.1x
IEEE 802.3

A

IEEE 802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTP Proxy Servers are the least common type of proxy server?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On many Routers and Switches, you can implemnt QoS through bandwidth management, such as _________, where you control the flow of packets into or out of the network according to the type of packet or other rules?

port mirroring
traffic shaping
content switching
trunking

A

traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It’s rare to see single Networks that combines remote incoming connections, public Web or Email Servers, wireless networks, and a string of connected switches?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you set a VLAN switch to transparent, you tell it not to update but to hold on to its manual settings?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?

content switching
round robin
proxy
load balancing

A

load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the really cool things about switch - and router - level authentication is the ability to fall back or fail over to a “next method” of authentication?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of passing traffic between two VLANs is called inter-VLAN Routing?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of Network enables you to segment a physical network into multiple discreet networks without adding additional hardware?

virtual private network (VPN)
dial-up
virtual local area network (VLAN)
ethernet LAN

A

virtual local area network (VLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which is the most common type of Proxy Server?

IP
HTTP
FTP
TCP

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?

transparent, server, and client
master, server, and client
open, closed, and active
secure, transparent, and gateway

A

transparent, server, and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Port Bonding?

A

Joining two or more Ports logically in a Switch so that they work together as a Team to increase bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe VTP Pruning?

A

Useful tool on a larger scale for minimizing broadcast traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Briefly describe what happens when a computer comes to a DNS load balancing server for resolution?

A

DNS load balancing responds with A Records, and spaces out requests across multple servers.
The load balancing will do either a round robin via DNS or delegate a reverse lookup to handle the request from a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the advantage of using Cisco’s VLAN Trunking Protocol (VTP)?

A

Updates Switch VTP Clients/Servers within minutes, can cut down big jobs of changing every Switch manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe a Reverse Proxy Server?

A

Acts on behalf of its Servers.
Protects the Server from the outside.
Higher Security, can handle DoS Attacks
Hides the Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cisco implements DHCP relay through a configuration command called ________?

A

IP helper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A _________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?

A

network-based IDS (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The term ________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?

A

out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Many new managed switches have a defualt __________ address?

A

IP

25
Q

Every Ethernet switch uses the IEEE __________ trunk standard that enables you to connect switches from different manufacturers?

A

802.1Q

26
Q

Which term refers to the capability of a Switch to copy data from any or all physical ports on a Switch to a single physical port?

load balancing
port authentication
port blocking
port mirroring

A

port mirroring

27
Q

__________ specifies a number of features and option to automate the negotiation, management, load balancing, and failure modes of aggregated ports?

VLAN Trunking Protocol (VTP)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Link Aggregation Control Protocol (LACP)

A

Link Aggregation Control Protocol (LACP)

28
Q

A _________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?

firewall
network-based IDS (NIDS)
load balancer
software-based IDS (SIDS)

A

network-based IDS (NIDS)

29
Q

Another name for port bonding is _____________?

port aggregation
proxy serving
port blocking
port mirroring

A

port aggregation

30
Q

Which term does CompTIA use for relay agent that is enabled and configured within a router?

trunk port
DHCP relay
tag
agent

A

DHCP relay

31
Q

Which term is synonymous with traffic shaping?

traffic routing
port blocking
bandwidth shaping
quality of servce routing

A

bandwidth shaping

32
Q

A managed switch needs an IP Address to enable configuration on Layer 3?

True
False

A

True

33
Q

Content switches designed to work with Web Servers can read incoming HTTP and HTTPS requests?

True
False

A

True

34
Q

Which tool does Cisco use to implement DHCP relay?

Yost
relay agent
IP helper
BIND

A

IP helper

35
Q

All of the cables from joined ports must go to the same device - another switch, a storage area, network (SAN), a station, etc…?

True
False

A

True

36
Q

A managed switch needs an _________ to enable configuration on Layer 3?

segment ID
IP Address
port number
MAC Address

A

IP Address

37
Q

The VLAN ID a trunk port associates untagged traffic with its _______ VLAN?

home
remote
local
native

A

native

38
Q

Describe in-band and out-of-band management?

A
In-Band = When you configure a Switch over a Network, anyone who knows the IP Address of the managed device.
Out-of-Band = When you connect a switch to a dedicated port to reduce risk that's totally separate from the rest of the Network which will prevent unauthorized access to those Ports.
39
Q

How does DHCP manage IP Address assignment?

A

4 Step Process called the Four-Way Handshake, or DORA.

Discover, Offer, Request, and Acknowledgement.

40
Q

At what layer of the OSI model do content switches operate? Describe the advantages they provide when working with Web Servers?

A

Content Switches work at Layer 7 (Application) of the OSI Model.

Designed to work with Web Serers to read incoming HTTP and HTTPS requests.

You can perform very advanced actions with this, such as handling TLS Certificates and Cookies, or removing the workload from the Web Servers - Load Balancing.

41
Q

How does a multilayer switch work at Layer 2 or Layer 3?

A

Layer 2 Switch forwards traffic based on MAC Addresses.

Layer 3 Switch forwards traffic based on IP Address and is considered a Managed Switch or a “Layer 3 Capable Switch”.

A Layer 3 Switch is a Multilayer Switch because it can operate in both Layers.

42
Q

Describe voice VLANs?

A

VLANs that are optimized for voice data streams and prioritize voice traffic over data traffic to ensure smooth communication.
Think of QoS but for voice stream.

43
Q

Anti-malicious software (Anti-Malware) developers create __________, collections of signatures for known malware?

A

definition files

44
Q

Cisco uses a proprietary protocol called ___________ to automate the updating of multiple VLAN switches?

A

VLAN Trunking Protocol (VTP)

45
Q

____________ refers to the capability of many managed switches to copy data from any or all physical ports on a switch to a single physical port?

A

Port Mirroring

46
Q

The term ____________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?

A

out-of-band

47
Q

If you have a switch in a far-flung location, it’ll be much easier to manage with some method of __________ management?

A

remote

48
Q

The Cisco Protocol for accomplishing aggregation is called Port Aggregation Protocol (PAgP)?

True
False

A

True

49
Q

Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

assigned port
port 0
logical port
trunk port

A

trunk port

50
Q

Every Web Client comes with a program that enables you to set the IP Address of the proxy server?

True
False

A

True

51
Q

You can’t connect to a Managed Switch to tell it what you want it to do?

True
False

A

False

52
Q

Every port starts with the default VLAN, VLAN1, so even if you don’t specify multiple VLANs, you get one by default?

True
False

A

True

53
Q

Compare the two forms of Port Mirroring: Local and Remote?

A

Local - Copies data from one or more ports on a single switch to a specific port on that switch.
Remote - Enables you to access data copied from one or more specific ports on a switch without plugging directly into that switch.

54
Q

How does IDS let the network administrators know if an attack is taking place?

A

At the very least the attack is logged, but some IDS offer a pop-up Alert message, email, or even a text message to your phone.

55
Q

Define a Trunk Port?

A

Carries all traffic, regardless of VLAN number, between all switches in a LAN.

56
Q

The process of transferring VLAN traffic between two or more switches called ____________?

A

Trunking

57
Q

Load balancing means making a bunch of servers look like a single server, thereby creating an ______________?

A

server cluser

58
Q

A ______________ sits in between clients and external servers, essentially pocketing the requests from the clients for servers resources and making those requests itself?

A

proxy server

59
Q

The term _____________ management refers to configuring a switch over the network?

A

in-band