Switch Features Flashcards

1
Q

Be sure to change the ___________ on your switches

A

default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is what you get when you chop up a broadcast domain and turn it into a bunch of little broadcast domains:

A

Virtual Lan ( VLAN )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

you can use a ________ to connect 2 VLAN’s

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Higher-end switches offer ____________routing

A

interVLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__________ routing acts like one or more virtual routers to connect multiple VLAN’s

A

interVLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

these ports move all VLAN traffic between switches

A

Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

trunking is done by _____________ the ports

A

tagging, or Port Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ is a protocol to allow trunking on certain switches

A

802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a Cisco proprietary protocol that is used to automate the updating of all VLAN switches

A

VLAN Trunking Protocol (VTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The __________ command displays a switches running configuration

A

show config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___________ command displays the interfaces for all the ports.

A

show interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ are packets that are smaller than the required ethernet standard

A

runts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ are packets that are larger than the required Ethernet Standard

A

giants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___________ command displays the routing table on a Cisco switch

A

show route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ do not use IP addresses or work with Layer 3

A

switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ ___________ use STP to detect looping by deactivating the ports if necessary

A

Switch interconnections

17
Q

_____ _______ is a Cisco method allowing only non-switch devices to connect to the switch

A

BPDU guard

18
Q

_____ ________ links switch ports to increase bandwidth

A

Port Bonding

19
Q

Use _____ for the trunking protocol

20
Q

Set port to _________ __________ or _________ __________ or they wont work.

A

Active - Active
Active - Passive
setting them to just Passive won’t work.

21
Q

______ ___________ enables the traffic flowing through one port to be monitored on another port

A

Port mirroring

22
Q

The ________ ___________ feature enables admins to inspect traffic remotely from a suspect machine

A

Port mirroring

23
Q

_________ __________ is configured on a switch by providing a source port and a destination port.

A

Port mirroring

24
Q

_______ ___ __________ contols help you better manage available bandwidth

A

Quality of Service

25
One type of QoS control is :
traffic shaping
26
________ _______ on SOHO routers allows you to set priorities for different protocols
Simple QoS
27
This system switch feature detects and reports possible attacks to the admins
Intrusion Detection Software (IDS)
28
This switch feature system runs inline with the Network and acts to stop detected attacks.
Intrusion Prevention system (IPS)
29
A firewall filters, an IDS notifies, an IPS acts to stop.
30
this is a dedicated box or software in an organization like schools caching has content filtering acts like a firewall hides the clients from the server
Forward Proxy Server
31
this type of proxy doesn't have to go through a bunch of configuration, has to be inline between you and the internet,
Transparent proxy
32
this type of proxy is good for High Security Handles DoS Attacks Load balancing Caching Encryption acceleration hide the server
Reverse Proxy Server
33
Load balancing can be done with:
Can route the most available server, either by a configured list DNS Severs - round robin Server side - use clustering - uses a sophisticated hardware device that is located within the server.
34
________ are used to protect public-facing servers by creating and isolated area for those devices.
DMZ's
35
Two ________ are used in a DMZ: one allowing unsolicited traffic to public service, and second maintaining isolation of the private network
firewalls
36
________ _________ can be used to block specific access for areas that may need additional restrictions but, still function within the main domain
Internal firewalls