Back to AI Flashcard MakerInformation Technology /CompTIA Network+ N10-008 CH11 - Course Quiz

CompTIA Network+ N10-008 CH11 - Course Quiz

Information Technology59 CardsCreated 3 months ago

In DNS load balancing, multiple IP addresses (each pointing to different servers) are associated with the same domain name. DNS rotates these IPs to distribute traffic across several servers, not just one.

In DNS Load Balancing, all Web Servers share the same IP Address?

True
False

False


Tap or swipe ↕ to flip
Swipe ←→Navigate
1/59

Key Terms

Term
Definition

In DNS Load Balancing, all Web Servers share the same IP Address?

True
False

False


Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?

port mirroring
proxying
port blocking
port authentication

port mirroring

In order for a VLAN to get its name, what is typically appended to the word “VLAN”?

a slash
a number
an IP Address
a MAC Address

a number

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a Network?

promiscuous
transparent
server
client

promiscuous

Which trunk standard enables you to connect switches from different manufacurers?

IEEE 802.11
IEEE 802.1Q
IEEE 802.1x
IEEE 802.3

IEEE 802.1Q

HTTP Proxy Servers are the least common type of proxy server?

True
False

False

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

In DNS Load Balancing, all Web Servers share the same IP Address?

True
False

False


Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?

port mirroring
proxying
port blocking
port authentication

port mirroring

In order for a VLAN to get its name, what is typically appended to the word “VLAN”?

a slash
a number
an IP Address
a MAC Address

a number

Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a Network?

promiscuous
transparent
server
client

promiscuous

Which trunk standard enables you to connect switches from different manufacurers?

IEEE 802.11
IEEE 802.1Q
IEEE 802.1x
IEEE 802.3

IEEE 802.1Q

HTTP Proxy Servers are the least common type of proxy server?

True
False

False

On many Routers and Switches, you can implemnt QoS through bandwidth management, such as _________, where you control the flow of packets into or out of the network according to the type of packet or other rules?

port mirroring
traffic shaping
content switching
trunking

traffic shaping

It’s rare to see single Networks that combines remote incoming connections, public Web or Email Servers, wireless networks, and a string of connected switches?

True
False

False

When you set a VLAN switch to transparent, you tell it not to update but to hold on to its manual settings?

True
False

True


Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?

content switching
round robin
proxy
load balancing

load balancing

One of the really cool things about switch - and router - level authentication is the ability to fall back or fail over to a “next method” of authentication?

True
False

True

The process of passing traffic between two VLANs is called inter-VLAN Routing?

True
False

True

Which type of Network enables you to segment a physical network into multiple discreet networks without adding additional hardware?

virtual private network (VPN)
dial-up
virtual local area network (VLAN)
ethernet LAN

virtual local area network (VLAN)

Which is the most common type of Proxy Server?

IP
HTTP
FTP
TCP

HTTP

Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?

transparent, server, and client
master, server, and client
open, closed, and active
secure, transparent, and gateway

transparent, server, and client

Describe Port Bonding?

Joining two or more Ports logically in a Switch so that they work together as a Team to increase bandwidth.

Describe VTP Pruning?

Useful tool on a larger scale for minimizing broadcast traffic.

Briefly describe what happens when a computer comes to a DNS load balancing server for resolution?

DNS load balancing responds with A Records, and spaces out requests across multple servers.
The load balancing will do either a round robin via DNS or delegate a reverse lookup to handle the request from a computer.

What is the advantage of using Cisco’s VLAN Trunking Protocol (VTP)?

Updates Switch VTP Clients/Servers within minutes, can cut down big jobs of changing every Switch manually.

Describe a Reverse Proxy Server?

Acts on behalf of its Servers.
Protects the Server from the outside.
Higher Security, can handle DoS Attacks
Hides the Server.

Cisco implements DHCP relay through a configuration command called ________?

IP helper

A _________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?

network-based IDS (NIDS)

The term ________ management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?

out-of-band

Many new managed switches have a defualt __________ address?

IP

Every Ethernet switch uses the IEEE __ trunk standard that enables you to connect switches from different manufacturers?

802.1Q

Which term refers to the capability of a Switch to copy data from any or all physical ports on a Switch to a single physical port?

load balancing
port authentication
port blocking
port mirroring

port mirroring

__ specifies a number of features and option to automate the negotiation, management, load balancing, and failure modes of aggregated ports?

VLAN Trunking Protocol (VTP)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Link Aggregation Control Protocol (LACP)

Link Aggregation Control Protocol (LACP)

A _ consists of multiple sensors placed around the network, often on one or both sides of the gateway router?

firewall
network-based IDS (NIDS)
load balancer
software-based IDS (SIDS)

network-based IDS (NIDS)

Another name for port bonding is _?

port aggregation
proxy serving
port blocking
port mirroring

port aggregation

Which term does CompTIA use for relay agent that is enabled and configured within a router?

trunk port
DHCP relay
tag
agent

DHCP relay

Which term is synonymous with traffic shaping?

traffic routing
port blocking
bandwidth shaping
quality of servce routing

bandwidth shaping

A managed switch needs an IP Address to enable configuration on Layer 3?

True
False

True

Content switches designed to work with Web Servers can read incoming HTTP and HTTPS requests?

True
False

True

Which tool does Cisco use to implement DHCP relay?

Yost
relay agent
IP helper
BIND

IP helper

All of the cables from joined ports must go to the same device - another switch, a storage area, network (SAN), a station, etc…?

True
False

True

A managed switch needs an _ to enable configuration on Layer 3?

segment ID
IP Address
port number
MAC Address

IP Address

The VLAN ID a trunk port associates untagged traffic with its _ VLAN?

home
remote
local
native

native

Describe in-band and out-of-band management?

In-Band = When you configure a Switch over a Network, anyone who knows the IP Address of the managed device.

Out-of-Band = When you connect a switch to a dedicated port to reduce risk that's totally separate from the rest of the Network which will prevent unauthorized access to those Ports.

How does DHCP manage IP Address assignment?

4 Step Process called the Four-Way Handshake, or DORA.

Discover, Offer, Request, and Acknowledgement.

At what layer of the OSI model do content switches operate? Describe the advantages they provide when working with Web Servers?

Content Switches work at Layer 7 (Application) of the OSI Model.

Designed to work with Web Serers to read incoming HTTP and HTTPS requests.

You can perform very advanced actions with this, such as handling TLS Certificates and Cookies, or removing the workload from the Web Servers - Load Balancing.

How does a multilayer switch work at Layer 2 or Layer 3?

Layer 2 Switch forwards traffic based on MAC Addresses.

Layer 3 Switch forwards traffic based on IP Address and is considered a Managed Switch or a "Layer 3 Capable Switch".

A Layer 3 Switch is a Multilayer Switch because it can operate in both Layers.

Describe voice VLANs?

VLANs that are optimized for voice data streams and prioritize voice traffic over data traffic to ensure smooth communication.
Think of QoS but for voice stream.

Anti-malicious software (Anti-Malware) developers create __, collections of signatures for known malware?

definition files

Cisco uses a proprietary protocol called ___ to automate the updating of multiple VLAN switches?

VLAN Trunking Protocol (VTP)

refers to the capability of many managed switches to copy data from any or all physical ports on a switch to a single physical port?

Port Mirroring

The term management refers to plugging dedicated ports into a switch that is totally separate from the rest of the network, which will prevent unauthorized access to those ports?

out-of-band


If you have a switch in a far-flung location, it'll be much easier to manage with some method of __ management?

remote

The Cisco Protocol for accomplishing aggregation is called Port Aggregation Protocol (PAgP)?

True
False

True

Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

assigned port
port 0
logical port
trunk port

trunk port

Every Web Client comes with a program that enables you to set the IP Address of the proxy server?

True
False

True

You can't connect to a Managed Switch to tell it what you want it to do?

True
False

False

Every port starts with the default VLAN, VLAN1, so even if you don't specify multiple VLANs, you get one by default?

True
False

True

Compare the two forms of Port Mirroring: Local and Remote?

Local - Copies data from one or more ports on a single switch to a specific port on that switch.
Remote - Enables you to access data copied from one or more specific ports on a switch without plugging directly into that switch.

How does IDS let the network administrators know if an attack is taking place?

At the very least the attack is logged, but some IDS offer a pop-up Alert message, email, or even a text message to your phone.

Define a Trunk Port?

Carries all traffic, regardless of VLAN number, between all switches in a LAN.

The process of transferring VLAN traffic between two or more switches called ?

Trunking

Load balancing means making a bunch of servers look like a single server, thereby creating an ?

server cluser

A sits in between clients and external servers, essentially pocketing the requests from the clients for servers resources and making those requests itself?

proxy server

The term _ management refers to configuring a switch over the network?

in-band