1.2 Networking Devices Flashcards

N10-009 Obj. 1.2: Compare and contrast networking appliances, applications, and functions (31 cards)

1
Q

What is the primary function of a router?

A

To route traffic between different IP subnets using Layer 3 IP addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At which OSI layer does a router operate?

A

Layer 3 – Network Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Layer 3 switch?

A

A switch that includes routing capabilities, combining Layer 2 switching and Layer 3 routing in one device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What OSI layer do standard switches operate at?

A

Layer 2 – Data Link Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What hardware enables high-speed decision making inside enterprise switches?

A

ASIC (Application-Specific Integrated Circuit).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What feature allows switches to deliver power over the Ethernet cable?

A

Power over Ethernet (PoE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a traditional firewall filter traffic based on?

A

TCP/UDP port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What advanced capability does a Next-Generation Firewall (NGFW) provide?

A

Application-layer inspection and control (e.g., blocking specific apps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are common additional features of modern firewalls?

A

VPN support, NAT, routing, and dynamic routing protocol support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does IDS stand for, and what does it do?

A

Intrusion Detection System – detects and alerts on known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IPS stand for, and what does it do?

A

Intrusion Prevention System – detects and blocks known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What types of attacks are IDS/IPS designed to detect?

A

Known vulnerabilities like buffer overflows, cross-site scripting, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary purpose of a load balancer?

A

To distribute network or application traffic across multiple servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when a server behind a load balancer fails?

A

The load balancer removes it from the pool and continues with available servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are common load balancing optimizations?

A

TCP offloading, SSL offloading, caching, and QoS prioritization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is application-centric load balancing?

A

Directing specific application requests (like certain URLs) to specific servers.

17
Q

What is the primary role of a proxy server?

A

To act as an intermediary between a client and external server.

18
Q

What are benefits of using a proxy server?

A

Caching, content filtering, access control, malware scanning.

19
Q

What is the difference between an explicit and transparent proxy?

A

Explicit proxies require configuration; transparent proxies work automatically.

20
Q

What does NAS stand for, and how does it operate?

A

Network-Attached Storage – connect to a shared storage device across a network; provides file-level access.

21
Q

What does SAN stand for, and how does it operate?

A

Storage Area Network - a dedicated network that provides block-level access to storage, allowing servers to read and write to storage devices as if they were local drives—ideal for high-performance, large-scale data operations

22
Q

Why might a SAN be preferred for large files?

A

It allows modification of only changed blocks, increasing efficiency.

23
Q

What is the role of a wireless access point?

A

To connect wireless devices to the wired Ethernet network.

24
Q

What OSI layer does a WAP operate at?

A

Layer 2 – Data Link Layer.

25
In an enterprise, why are standalone WAPs used instead of wireless routers?
For dedicated wireless service and centralized management.
26
What is a Wireless LAN Controller (WLC)?
A centralized device used to manage multiple wireless access points.
27
What are key functions of a WLC?
Config deployment, performance monitoring, roaming management, reporting.
28
Are WLCs typically vendor-specific?
Yes, they are often proprietary and matched to the AP vendor.
29
What is TCP offloading and why is it used in network appliances?
TCP offloading shifts TCP processing tasks (e.g., checksum calculation, segmentation, session handling) from the CPU to specialized hardware like a NIC or load balancer, improving performance and reducing CPU load.
30
What is SSL offloading and why is it used?
SSL offloading moves the task of encrypting and decrypting SSL/TLS traffic from web servers to a dedicated device (like a load balancer), reducing CPU load on the servers and improving overall performance.
31
What is file-level access and which storage type uses it?
File-level access allows users to open, modify, and save entire files over the network; it is used by Network-Attached Storage (NAS) systems. If users want to access information in the file, they need to pull the entire file across the network. If you change information in a file, you will need to write the entire file back to the NAS (AKA big bandwidth)