1/242
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
MAC addresses
Used at the Data Link layer.
OSI model developer
International Organization for Standardization (ISO).
Logical addressing and routing
Handled by the Network layer.
Encapsulating application data layers
Transport, Application, Session, Presentation.
Translation and formatting of data
Handled by the Presentation layer.
Device operating at the Network layer
Router.
Entry point for applications
Provided by the Application layer.
Dialogue control layer
Session layer.
Switching associated layers
Data Link and Network (some switches are 'Layer 3 switches').
TCP and UDP operation layer
Transport layer (connectionless/connection-oriented).
Physical hardware devices layers
Physical, Data Link, Network.
Layer adding header and footer
Data Link layer.
Ethernet operation layer and MAC method
Data Link layer: CSMA/CD.
Final destination data delivery layer
Network layer.
Non-Network layer protocol
IMAP (It is Application layer).
Guaranteed delivery layer
Transport layer; connection-oriented.
Cabling and topology layers
Physical and Data Link.
Layers without exclusive TCP/IP protocols
Physical, Data Link, Session, Presentation.
Layer using port numbers
Transport layer.
OSI layers top-to-bottom order
Application, Presentation, Session, Transport, Network, Data Link, Physical.
Devices operating at the Physical layer
Repeaters, Hubs.
Device translating between OSI stacks
Gateway.
Firewall description
A device located between two networks that enables administrators to restrict traffic.
Firewall method using port numbers
Service-dependent filtering.
Low-cost LAN security method
Install a personal firewall on each computer.
True statements about hubs and switches
All devices on a hub share a collision domain; switches provide separate ones.
Switch type forwarding frames after lookup
Cut-through.
Unique to stateful firewalls
Scan Transport layer headers for SYN floods.
IDS detection methods
Anomaly-based, Behavior-based, Signature-based.
Another term for multiport bridge
Switch.
True about switches and routers
Routers = Network layer; Switches = Data Link.
Systems collecting IDS info
SIEM.
LAN splitting with a router benefits
Reduces broadcast traffic, Reduces unicast traffic.
True about bridges and switches
Data Link devices using MAC addresses.
Correct term for a traditional switch
Multiport bridge.
Router
Network layer devices using IP
Router requirement
Must support the Network layer protocol used
Router port
Each router port = separate broadcast domain
False statement about routers
Routers store and maintain route information in a local text file.
Firewall installation location
Between the Internet access router and the rest of the private internetwork
Proxy server OSI layer
Application
NGFW feature
Deep packet inspection (DPI)
Content filtering
Content filters examine the data carried within packets for potentially objectionable materials.
Load balancing criterion
Which server has the fastest processor
Device managing multiple APs
Wireless controller
Load balancer type
Router
Device with DPI and IPS capabilities
NGFW
Proxy server security benefit
The proxy server uses a public IP address, and the client computers use private addresses.
Traffic monitoring device
IDS
IDS feature for switched networks
Port mirroring
SAN protocol sharing with LAN
iSCSI
Another SAN protocol
FCoE
Protocol not used in SANs
VoIP
Protocol for locating iSCSI targets
iSNS
Max Fibre Channel speed
128 Gbps
NAS similarity
File server
NAS vs. SAN access type
NAS = file-level access; SAN = block-level access
NAS filesystem provision
NAS provides a filesystem; SAN does not
FCoE advantages
FCoE is less expensive
FCoE traffic sharing
FCoE can share IP network traffic
FCoE hardware usage
FCoE uses standard Ethernet hardware
Application layer protocols for NAS
CIFS
Another application layer protocol for NAS
NFS
iSCSI client term
Initiator
Protocols in iSCSI packet
Ethernet, IP, TCP
Protocols in Fibre Channel packet
None of the above
Protocol with layered model not matching OSI
Fibre Channel
Protocols in FCoE packet
Ethernet
Ralph's Internet access solution
The primary objective and one of the secondary objectives
Not a method of load balancing
VPN headend
Not a typical UTM feature
Network-attached storage
Multilayer switches operation layers
Physical, Data link, Network
Control plane policing
QoS
Device connecting internal VoIP
VoIP gateway
True definition of modem
A device that converts analog signals to digital signals and back again
VoIP device terms
Endpoint, Terminal
Use analog phone over IP
VoIP gateway
Prevents endless packet routing
Time to live (TTL)
CDN stands for
Content Delivery Network
Cloud model allowing OS installation
IaaS
Cloud model for email service
SaaS
Model with most control
IaaS
Cloud architectures Alice is using
IaaS, Public cloud
Model where org is both provider & consumer
Private cloud
Cloud bursting definition
Cloud bursting
Outlook.com service model
SaaS
True about cloud delivery models
A hybrid cloud enables administrators to migrate services between public and private resources.
IaaS
Service model Ed wants (Windows server, install app)
Potential security risk
Multitenancy pros/cons
Reduces overhead
Multitenancy pros/cons
Possible bandwidth competition
Multitenancy pros/cons
Cloud direct connection
Best hybrid connection to avoid bottlenecks
NFV ISG
Not a component of NFV
Public cloud is easier to expand
True statements about datacenter options
Public cloud has better physical security
True statements about datacenter options
Role-based access control
Alice using a security group for permissions is an example of
Security lists
Contain ingress and egress rules that apply to all of the virtual network interface cards (VNICs) in a subnet
NAT gateway
Allows traffic from the VNC to reach the Internet but does not allow Internet traffic into the VNC
Internet gateway
Allows VNC traffic both to and from the Internet
POP3 email client default ports
110 and 25