Lesson 11 Flashcards

1
Q

A VLAN is created by multiple _____ that forwards all network traffic to other locations.

switches

modems

All of these answers are correct.

routers

A

switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a _____ VLAN, the network administrator must set the ports on a switch to forward the traffic to a specific VLAN.

dynamic

single

double

static

A

static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.

All of these answers are correct.

Router

Modem

VLAN

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the main benefits to implementing a VLAN into a work environment?

Better security

All of these answers are correct.

Improved stability

Easier maintenance and troubleshooting

A

All of these answers are correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.

networks

permissions

experiences

routers

A

permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A remote employee needs to be able to access corporate email and file sharing but doesn’t necessarily have a lot of technical knowledge. What is the best access method?
Telnet
VPN

Mosh
SSH

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What main use does Telnet have in modern IT?
Telnet is used for fun things like games.
Telnet is used for secure access to remote computers.

Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.

A

Telnet is often used for embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What makes Mosh an alternative to SSH?
Mosh is faster than SSH.
Mosh is easier to set up than SSH.

Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.

A

Mosh can reconnect if a wireless connection gets interrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is Telnet discouraged as an access method?
Telnet is slow.
Telnet is unsecure.

It’s very old.
Telnet only uses text.

A

Telnet is unsecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What access method works best over mobile connections?
SSH.
Telnet.

VPN.
Mosh.

A

Mosh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH uses _____ cryptography to ensure authentication and security.
twin-key
public-key

white-box
round-robin

A

public-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ is the official name of the second version of Secure Shell, which became the standard in 2006.

SSH1

Safe Shell

SSH2

Socket Security

A

SSH2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When two systems first connect using SSH they exchange their _____ keys with each other.
car
public

private
decoder

A

public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH client and server utilities are found on most operating systems by default, except _____.
Microsoft Windows
Linux

Unix
MAC OS X

A

Microsoft Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH uses a client-server model. That means that a _____ requests a connection, and the _____ accepts or rejects it.
server, client
client, server

software, hardware
computer, software

A

client, server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What service does a VPN solution provide?
Report an Error

Access to public network resources
Remote access to private network resources
Access to the internet
Access to private network resources

A

Remote access to private network resources

17
Q

What are some of the tunneling protocols that VPNs use?
Report an Error

Blowfish and Twofish
IPsec and L2TP
AES and MD5
HTTP and FTP

A

IPsec and L2TP

18
Q

What is required for a VPN to function correctly?
Report an Error

Encryption and authentication protocols
They must not use encryption
Two or more networks
Two or more networks connected together

A

Encryption and authentication protocols

19
Q

What are two types of VPNs?
Report an Error

IPSec and SSL
Remote and site
Local area network and wide area network
Site-to-site and remote access

A

Site-to-site and remote access