Advanced Networking Devices Flashcards

1
Q

PPTP

A

A protocol that works with PPP to provide a secure data link between computers using encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

L2TP

A

A VPN protocol developed by Cisco that can run on almost any connection imaginable. L2TP has no authentication or encrtption but uses IPsec for all its security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

in-band management

A

Allows configuration over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

out-of-band management

A

One port is dedicated as a management port. configuration can only be done via that port.

You’ll find out-of-band management options –management URL, modem connection, console port – on switches and on routers. CompTIA uses the term console router to describe a router with out-of-band management capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trunking

A

is the process of transfering VLAN traffic between two or more switches. To do this you will need to configure a trunk port on each switch that will then carry all traffic, regardless of VLAN number, between all switches in a LAN

IEEE 802.1Q is the trunk standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VLAN Tagging

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multi-layer switch port addressing:

A

A switch opterating at layer 3 requires each port to have an IP address, because the routing table uses the IP addess to determine where to send packets. Cisco uses the terms switchport and router port to differentiate betweec the two types of ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Load Balancing

A

Means making a bunch of servers look like a single server, creating a server cluster.

DNS load balancing

Content Switch

QoS and Traffic Shaping

Port Bonding (link aggregation/NIC bonding/NIC teaming/port affrefation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS

A

Intrusion Detection System – is an application (often running on a dedicated box) that inspects a copy of packets, looking for active intrusions. An IDS functions inside the network. Sits outside the flow of traffic.

An IDS in promiscuouus mode inspects a copy of every pcket on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIDS

A

Network Bases IDS – consists of multiple sensors placed around the network, often on one or both sides of the router.

NIDS scans using signature files, thus it is a signature-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIDS

A

Host-based IDS – is software running on individual systems that monitors for events such as system file modification or registry changes.

A host-based IDS watches for suspicious behavior on systems, thus it is behavior-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPS

A

Intrusion Preventions System – sit directly in the flow of traffic. Can directly stop an attack while it si gappening.

The network bandwidth and latency take a hit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Server

A

sits between clients and external servers, essentially pocketing the repuests from the clients for server resources and making those requests itself. The client computers never touch the outside servers and thus stay protected from any unwanted activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Forward Proxy Server

A

Acts on behalf of clients, getting information from various sources and handing that informaition to the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reverse Proxy Server

A

Acts on behalf or its servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Traffic Shaping

A

Controlling the flow of packets into or out of the network according to the type of packet or other rules.

17
Q

802.1X

A

Port Authentication