S8-Ethernet Switching Flashcards

1
Q

What is a Deterministic Network?

A

Network Access should be very Organized and Orderly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Contention-based Network?

A

a method where multiple devices compete for access to a shared resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CSMA/CD

A

“Carrier Sense Multiple Access with Collision Detections”

a network access method used in Ethernet networks to coordinate access to a shared medium,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is CS in CSMA/CD?

A

“Carrier Sensing”

Ethernet devices can listen to the network to determine if there is already a signal being transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Carrier mean in electronics?

A

Refers to a signal that carries information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the MA in CSMA/CD?

A

“Multiple Access”

Many devices with the ability to access, listen on or transmit on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is CD in CSMA/CD?

A

“Collision Detection”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Random Backoff Timer

A

Collision resolution method where two devices pick a random timer and attempt retransmission once the timer hits 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Collision Domain?

A

a network segment where devices can potentially collide when transmitting data simultaneously on a shared medium, typically in half-duplex Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Role of an Ethernet Switch

A

Increases scalability of a network by creating multiple collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HUB

A

Layer 1 device that connects multiple network devices. acts as a multiport repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passive Hub

A

Repeats signal, no amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Hub

A

Repeats signal, With Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smart Hub

A

Active hub with enhanced features eg.
- Simple Network management protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BRIDGE

A

Layer 2 Network device that makes intelligent forwarding decisions based on physical device addressing (MAC address).
- breaks up collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SWITCH

A

Layer 2 network devices that connects multiple network segments together. Acts like a multiport bridge making forwarding decisions based off of MAC addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a Switch behave?

A

Breaks up a collision domain by treating each port as it’s own collision domain w/ a bridge allowing for physical device addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ROUTER

A

Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information (IP Address)
- acts as a bridge between broadcast domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

L3 SWITCH

A

Switch that can make routing decisions and connects entire networks , not just network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does a L3 switch behave?

A

Each of its ports is treated as it’s own broadcast & collision domain w/ IP & MAC routing capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a VLAN?

A

“Virtual Local Area Network”

Logical subdivision of a given network that segments into separate broadcast domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What Layer does VLANs operate at?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some Benefits of a VLAN?

A
  • Enhanced Security
  • Improved Performance
  • Increased management
  • improved cost efficiency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does a VLAN enhance security?

A
  • segments network which isolates sensitive data and reduces data breaches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does a VLAN improve Performance?
Reduces the size of a broadcast domain, decreasing the amount of traffic being sent over that segment.
26
How does a VLAN increase Management?
Makes it easier to implement policies and troubleshoot issues. each VLAN is treated as a separate network segment allowing for separate rules to be applied to different VLANs.
27
How does a VLAN improve cost efficiency?
allows you to create separate logical networks using the same physical hardware.
28
Where is the VLAN Database contained on a Cisco Switch?
in a Flat file called VLAN.DAT
29
What type of information is contained within a VLAN database?
- VLAN identifier - VLAN name - MTU size
30
what is an SVI
"Switch Virtual Interface" Allows switches to route traffic between different VLANs
31
What some VLAN Configuration types?
- 802.1Q Tagging - Native VLAN - Voice VLAN - Link Aggregation - Speed and Duplex Config
32
what is 802.1Q Tagging?
"VLAN Tagging" Refers to the IEEE standard that facilitates the management of multiple VLANs on a single network
33
How does VLAN Tagging work?
A VLAN Tag containing a VLAN identifier (VID) is inserted into an Ethernet Frame that allows your switches to identify and forward the frames to the proper VLAN
34
What is Trunking?
Transmission of traffic between different VLANs over the same physical network, while maintaining traffic from each VLAN separate.
35
What is a Native VLAN?
the VLAN that untagged traffic is assigned to when it enters a trunk port, allowing devices that don't tag their traffic to still communicate on a network with VLANs
36
What is a Voice VLAN?
Specialized VLAN dedicated to voice traffic (VoIP)
37
Why is Voice VLAN important?
Ensures the Quality and reliability of voice communication is upheld by separating voice traffic out from your regular traffic. - Voice traffic is sensitive to delays and packet loss
38
what is a QoS policy?
"Quality of Service" Set of rules that aim to guarantee the performance of specific network traffic (e.g., voice, video, data) by assigning priorities and allocating bandwidth accordingly.
39
What is Link Aggregation?
"Port Channeling/Bonding" Method used in networks to combine multiple connections into a single, logical link
40
Purpose of Port Bonding?
Combines multiple network links so that data can be distributed across multiple links to utilize the combined bandwidth of all those links. - used to support Trunking lines between switches
41
How does port bonding provide redundancy and resiliency?
Allows network traffic to flow over the remaining links if one of the bonded links fails.
42
What are Speed & Duplex Configurations?
Speed - Rate of data transfer in Mbps/Gbps Duplex - Mode of communication Half or Full Half - send OR receive Full - send AND receive
43
What is Auto-Negotiation?
Devices automatically select the highest performance settings in common
44
Spanning Tree Protocol (802.1d)
Network protocol that prevents looping of network traffic and permits redundant links between switches
45
what is a Broadcast Storm?
A situation where a large number of broadcast packets flood the network, overwhelming switches and endpoints.
46
What is a Switching loop?
Occurs when there are multiple paths between network devices, creating a cycle where data packets endlessly circulate.
47
How does STP prevent Looping?
Root Bridge Non-root Bridge
48
Root Bridge
A switch is elected to act as a reference point for the entire spanning tree.
49
Which switch is selected to act as a Root Bridge?
Switch with the lowest Bridge ID (BID)
50
what is in a Bridge ID (BID)?
A priority value and a Mac address
51
What is a Non-Root Bridge?
All other switches in an STP topology
52
What is a Root Port?
a port on a non-root bridge switch that offers the shortest path to the root bridge, and is always in a forwarding state.
53
What is a Designated Port?
Closest port to the root bridge on a network segment.
54
in STP what are the ports on the Root Bridge considered?
All the ports on a Root Bridge are designated ports
55
What are Non-Designated Ports?
Ports that block traffic to create loop-free topology
56
How do Non-designated ports receive Data?
As a Bridge Protocol Data Unit (BPDUs)
57
What Transitions does a Non-designated port make to reach a forwarding state?
- blocking - listening - learning - forwarding
58
Blocking state
BPDUs Received, but not forwarded
59
Listening State
populates the MAC Address table, but does not forward frames
60
Learning State
Processes BPDUs and Determines role within the spanning tree
61
Forwarding State
Forwards Frames for operations
62
what is Link Cost?
Priority value given to a link based on the speed of that link. - Faster link = lower cost
63
What is NAC?
"Network Access Control" Method for increasing network security by inspecting devices connecting to the network. (Network customs)
64
What are parts of a NAC inspection process?
- Port Security - MAC Filtering - 802.11x Authentication
65
Port Security
Securing Physical network ports to prevent unauthorized access
66
MAC Filtering
Limits network access based on Physical Device addressing (MAC Address)
67
Allowlisting
Allows specified devices, blocks the rest - more secure
68
Blocklisting
Blocks specified devices, allows the rest - less secure
69
802.1x Authentication
Network Authentication framework that ensures only authenticated users access network services.
70
How does 802.1x work?
Works by encapsulating Extensible Authentication Protocol (EAP) within your network's frames. - enables the use of various authentication methods eg. Usernames & Passwords, Smart cards, digital certificates etc.
71
What 3 components are involved in the 802.1x process?
- Supplicant - Authenticator - Authentication server
72
Supplicant
User Device seeking to access the network
73
Authenticator
Network device the user wants to connect to
74
Authentication Server
Server on the network that will authenticate the user's device
75
What Agents are used to check each device that connects to the network?
- Persistent Agents - Non-persistent Agents
76
Persistent Agents
Software that Can continuously monitor and enforce compliance with an organization's security policies - usually installed on company owned devices
77
Non-persistent agents
Allows users to connect to the network and access a captive portal which then asks the user to run a temporary agent that assesses the device's compliance and then removes itself. - usually installed on user's personally owned devices
78
What are some ways NACs can be tailored?
- Time-based - Location-based - Role-based - Rule-based
79
Time-based
Regulates access to specified hours
80
Location-based
Regulates access based on verified physical location
81
Role-based
Regulates access based on the user's role within an Org.
82
Rule-based
Regulates access based on a set of predefined rules
83
What is an MTU?
"Maximum Transition Unit" Largest size of a data packet or frame that can be sent over a network. - Max load cap. for frames inside a network
84
What is the standard MTU size for Wired Ethernet?
1500 bytes
85
What is it recommended to configure a smaller MTU size?
- Wireless Networks - VPN connections (1400-1450 bytes) - PPPoE connections (1400-1420 bytes)
86
What are JUMBO Frames?
Frames that exceed the standard ethernet MTU size of 1500 bytes.
87
What is the default size of a JUMBO Frame?
9000 bytes
88
Why are JUMBO frames beneficial?
more data can be moved inside of a single frame - reducing overhead, - reduce switch processor load - improve data transfer and throughput speeds.
89
Where are JUMBO Frames ideal?
- High-bandwidth Applications - Storage are networks - Large File transfers - Video Streaming - Server-Server communications
90
What is Fragmentation in JUMBO Frames?
When a Jumbo frame encounters a network segment with a smaller MTU size, the frame will have to be split up into smaller frames.
91
Potential Drawbacks of JUMBO Frames
- Misconfiguration - Fragmentation - Harder to troubleshoot