9.1-9.5 Flashcards Preview

Network+ Exam Prep > 9.1-9.5 > Flashcards

Flashcards in 9.1-9.5 Deck (35)
Loading flashcards...
1
Q

SAN technology- cost

A

Cost wise, iSCSI and FCoE are cheaper, but Fibre Channel and Infiniband perform better.

2
Q

SAN technology- Specialization

A

iSCSI and FCoE are easier to implement than Fibre Channel and Infiniband, which require specialized hardware and knowledge.

3
Q

SAN technology- Speed

A

iSCSI and FCoE are not as fast as Fibre Channel and Infiniband. -iSCSI and FCoE speeds will increase as Ethernet speeds increase.

4
Q

SAN technology- Distance

A

Infiniband has a short distance limitation of about 300 meters, and Fibre Channel has a distance limitation of 10 kilometers.

5
Q

storage area network (SAN)

A

is a dedicated network separate from the production network. Connects file servers with storage devices. Multiple servers can connect through the SAN fabric to share the same storage device. A single server can connect with multiple storage devices

6
Q

Network-Attached Storage (NAS)

A

A NAS device is essentially a pared down file server that has been optimized to store files for network users. A NAS appliance has: -A motherboard with a processor and memory - One or more NICs A RAID array, usually with a terabyte or more of storage space -A minimal network operating system

7
Q

Fibre Channel over Ethernet (FCoE)

A

was developed to lower the cost of Fibre Channel solutions

8
Q

Fibre Channel (FC)

A

uses fiber optic cabling, network adapters, and switches to build the SAN fabric.

9
Q

Internet Small Computer Systems Interface (iSCSI)

A

uses network protocols that encapsulates SCSI commands within IP packets and transmits them over a standard Ethernet network.

10
Q

Infiniband

A

was designed for high-performance supercomputers

11
Q

Clustering

A

-To users on the network, the cluster appears as a single file server. -If one of the devices in the cluster goes down, the other devices immediately take over and continue providing access to the files.

12
Q

Load Balancing

A

-A load balanced NAS cluster can divide up the work and distribute it between multiple NAS devices in the cluster. -Load balancing can dramatically increase the performance of a NAS cluster.

13
Q

PoE

A

follows the original 802.3af standard and provides 15.4 watts of DC power.

14
Q

PoE+ (or PoE Plus)

A

follows the updated 802.3at standard and provides 25.5 watts of DC power for Type 2 devices.

15
Q

VoIP endpoints

A
  • must be configured with a username and password that matches an account on the VoIP server. Otherwise, they will not be allowed to communicate with the VoIP server -can be configured with jitter buffers
16
Q

** VoIP PBX purpose is to

A

provide a switching mechanism to connect internal calls between VoIP endpoints

17
Q

**VoIP gateway

A

converts voice and fax calls between the PSTN and your IP network in real time

18
Q

Jumbo Frames

A

• Ethernet frames with more than 1,500 bytes of payload • Increases transfer efficiency

19
Q

Latency troubleshooting

A

-Too much latency causes VoIP callers to talk over each other. -Experts advise that 250 milliseconds is the maximum level of latency that is acceptable in VoIP systems. -Latency between 75 to 150 milliseconds is conducive to acceptable quality for VoIP conversations

20
Q

Jitter troubleshooting

A

-Latency going up and down during a call can cause unusual sound effects (minor pauses, jumps, choppiness) -When troubleshooting jitter, first check QoS settings -Jitter buffers add delays and can introduce latency issues. -Identify and correct the sources of jitter before considering jitter buffer

21
Q

Software-defined networking

A

is an approach to using open protocols, to apply globally aware software control at the edges of the network to access network switches and routers that typically would use closed and proprietary firmware.

22
Q

Virtual switch

A

allows one virtual machine to communicate with another in much the same way that a physical switch allows physical hosts to communicate with each other.

23
Q

Virtual firewall

A

provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.

24
Q

A Virtual NIC

A

uses Ethernet standards to transmit and receive frames on the network

25
Q

Virtual Router

A

can support multiple networks on each router interface

26
Q

Hypervisor

A

-automatically assigns a MAC address to each virtual network interface -some allow you to use a custom MAC address if needed -most allow you to define many different virtual networks

27
Q

Jumbo Frames

A

are Ethernet frames with more than 1500 bytes of payload. Can carry up to 9000 bytes of payload, but variations exist.

28
Q

Software as a Service (SaaS)

A

delivers software applications to the client either over the internet or on a local area network. Can be: - A simple multi-tenancy implementation in which customers have their own resources that are segregated from other customers. -A fine grain multi-tenancy implementation in which resources are shared, but data is segregated from other customers

29
Q

Platform as a Service (PaaS)

A

delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.

30
Q

Infrastructure as a Service (IaaS)

A

delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.

31
Q

A Private Cloud

A

provides resources to a single organization. Access is granted only to the users within the organization.

32
Q

A Public Cloud

A

can be accessed by anyone. Cloud-based computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider.

33
Q

A hybrid cloud is

A

a combination of public, private, and community cloud resources from different service providers. The goal is to expand the functionality of a given cloud service by integrating it with other cloud services.

34
Q

connectivity methods

A

a network connection, and connect to either a public cloud on the internet or a private cloud provided by an organization

35
Q

Security implications

A
  • Authenticate all users who access the service and only allow users to access the applications and data that they need.
  • Segregate each organization’s centrally stored data. Verify, test, and apply updates to the infrastructure.

Establish a formal process for all facets of the service, from user requests to major data breaches and catastrophic events

  • Implement security monitoring of things like usage and unusual behavior. Implement encryption up to the point of use, such as the client’s web browser.
  • Probe for security holes with a third-party service provider.
  • Comply with all regulatory measures, like the Sarbanes-Oxley Act.