1.8 V2 Flashcards

(27 cards)

1
Q

What is the primary purpose of Secure Access Secure Edge (SASE) in a modern network environment?

  • Combine network and security functions into a cloud-delivered model
  • Redirect all traffic through an on-premises data center
  • Increase bandwidth by disabling encryption
  • Limit device communication to local VLANs only
A

βœ… Correct Answer: Combine network and security functions into a cloud-delivered model

πŸ“˜ Explanation: SASE unifies networking and security into a cloud-native architecture, providing optimized access and secure connectivity for distributed users and devices.

πŸ“Œ Practical Use Case: A company with multiple remote workers uses SASE to securely connect them to internal apps without routing traffic through a central data center.

πŸ“š Exam Objective Reference: 1.8 – Secure Access Secure Edge (SASE)

πŸ” Follow-Up: What are the security benefits of SASE compared to traditional VPNs?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does β€œapplication-aware” mean in the context of SD-WAN?

  • The network can recognize and optimize traffic based on specific applications
  • SD-WAN only supports encrypted applications
  • The WAN requires manual input for every application
  • Applications must be assigned to VLANs manually
A

βœ… Correct Answer: The network can recognize and optimize traffic based on specific applications

πŸ“˜ Explanation: Application-aware SD-WAN identifies application traffic and applies policies such as prioritization or QoS.

πŸ“Œ Practical Use Case: A business prioritizes voice traffic (like Zoom) over file downloads to ensure call quality during peak hours.

πŸ“š Exam Objective Reference: 1.8 – SD-WAN (Application Aware)

πŸ” Follow-Up: How can application-aware routing improve user experience?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a benefit of zero-touch provisioning in SD-WAN?

  • Devices can be automatically configured at remote locations without manual setup
  • All WAN devices must be staged in a central office first
  • Devices need to be manually updated every time a config changes
  • Physical access is required for initial provisioning
A

βœ… Correct Answer: Devices can be automatically configured at remote locations without manual setup

πŸ“˜ Explanation: Zero-touch provisioning allows SD-WAN devices to be shipped and auto-configured at their destination.

πŸ“Œ Practical Use Case: A retail chain rolls out 100 branch routers that self-configure when powered on and connected to the internet.

πŸ“š Exam Objective Reference: 1.8 – SD-WAN (Zero-Touch Provisioning)

πŸ” Follow-Up: What risks does zero-touch provisioning reduce in large-scale deployments?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does it mean for SD-WAN to be “transport agnostic”?

  • It can route traffic over any type of connection, like MPLS, LTE, or broadband
  • It requires dedicated fiber links between all sites
  • It only functions with IPsec tunnels
  • It cannot use cellular or broadband internet
A

βœ… Correct Answer: It can route traffic over any type of connection, like MPLS, LTE, or broadband

πŸ“˜ Explanation: Transport-agnostic SD-WAN uses any available transport method, selecting the best path in real time.

πŸ“Œ Practical Use Case: A business uses MPLS during peak hours and switches to LTE during outages without disrupting services.

πŸ“š Exam Objective Reference: 1.8 – SD-WAN (Transport Agnostic)

πŸ” Follow-Up: How does transport agnosticism improve fault tolerance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of central policy management in an SD-WAN solution?

  • Enforces consistent traffic, security, and routing policies across all connected sites
  • Allows each site to independently manage its own firewall and routes
  • Forces traffic through a central router even if a better path exists
  • Prevents the use of QoS or application-based routing rules
A

βœ… Correct Answer: Enforces consistent traffic, security, and routing policies across all connected sites

πŸ“˜ Explanation: Central policy management lets administrators define and push global rules from one interface.

πŸ“Œ Practical Use Case: An IT team rolls out a global firewall rule blocking unauthorized cloud storage apps at 50 locations instantly.

πŸ“š Exam Objective Reference: 1.8 – SD-WAN (Central Policy Management)

πŸ” Follow-Up: What are the risks of not using centralized policy control in SD-WAN?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a primary function of VXLAN in a data center environment?

  • Extending Layer 2 networks across Layer 3 infrastructure
  • Encrypting files stored on SAN devices
  • Isolating Wi-Fi traffic from wired VLANs
  • Assigning IPv6 addresses to virtual machines
A

βœ… Correct Answer: Extending Layer 2 networks across Layer 3 infrastructure

πŸ“˜ Explanation: VXLAN encapsulates Layer 2 Ethernet frames within Layer 3 UDP packets, allowing Layer 2 connectivity over routed networks.

πŸ“Œ Practical Use Case: A company hosts virtual machines in different data centers that need to behave as if they’re on the same subnet.

πŸ“š Exam Objective Reference: 1.8 – VXLAN

πŸ” Follow-Up: What protocol does VXLAN typically use to encapsulate Layer 2 traffic?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does VXLAN support data center interconnect (DCI)?

  • It tunnels Layer 2 traffic over a Layer 3 core to link separate locations
  • It converts IPv4 packets to Layer 2 broadcast domains
  • It disables VLANs to allow routing at Layer 2
  • It uses NAT to create private WAN circuits between sites
A

βœ… Correct Answer: It tunnels Layer 2 traffic over a Layer 3 core to link separate locations

πŸ“˜ Explanation: VXLAN enables seamless Layer 2 communication between virtualized data centers by tunneling traffic over IP.

πŸ“Œ Practical Use Case: A company uses VXLAN to allow VMs in London and New York to exist on the same VLAN for workload mobility.

πŸ“š Exam Objective Reference: 1.8 – VXLAN (DCI)

πŸ” Follow-Up: How does VXLAN differ from traditional VLANs in scalability?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the core principle behind Zero Trust Architecture (ZTA)?

  • Never trust, always verify
  • Trust anyone on the internal network
  • Allow temporary admin access by default
  • Authenticate users once per day
A

βœ… Correct Answer: Never trust, always verify

πŸ“˜ Explanation: Zero Trust assumes every connection attempt could be a threat and continuously validates user, device, and context.

πŸ“Œ Practical Use Case: A company uses ZTA to ensure that even internal users must authenticate and pass posture checks before accessing resources.

πŸ“š Exam Objective Reference: 1.8 – Zero Trust Architecture (ZTA)

πŸ” Follow-Up: How does Zero Trust prevent lateral movement during a security breach?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does β€œleast privilege access” mean in a Zero Trust environment?

  • Users only receive access to the resources necessary for their role
  • All employees have access to shared drives by default
  • Access rights are inherited from department groups
  • Admins can escalate privileges without logging
A

βœ… Correct Answer: Users only receive access to the resources necessary for their role

πŸ“˜ Explanation: Least privilege access limits user permissions to the bare minimum needed to perform their tasks, reducing risk.

πŸ“Œ Practical Use Case: An HR assistant can access payroll records but not employee performance reviews or IT systems.

πŸ“š Exam Objective Reference: 1.8 – Zero Trust Architecture (Least Privilege)

πŸ” Follow-Up: How does least privilege help reduce insider threats?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is policy-based authentication in Zero Trust Architecture?

  • Access decisions are based on contextual factors like user identity, device health, and location
  • A user logs in once per day with a global credential
  • Authentication is handled only by MAC address filtering
  • All internal devices are automatically trusted
A

βœ… Correct Answer: Access decisions are based on contextual factors like user identity, device health, and location

πŸ“˜ Explanation: Policy-based authentication evaluates multiple conditions before granting access, not just a username and password.

πŸ“Œ Practical Use Case: A user logging in from a known device on a secure network gains access, while login from an unknown location triggers MFA.

πŸ“š Exam Objective Reference: 1.8 – Zero Trust Architecture (Policy-Based Authentication)

πŸ” Follow-Up: What tools can enforce policy-based authentication in cloud environments?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary goal of Security Service Edge (SSE)?

  • Provide security controls like CASB and SWG in a cloud-native platform
  • Replace all firewalls with VPN concentrators
  • Route all traffic to internal DNS servers
  • Replace the need for centralized authentication
A

βœ… Correct Answer: Provide security controls like CASB and SWG in a cloud-native platform

πŸ“˜ Explanation: SSE delivers security services such as secure web gateways (SWG), cloud access security brokers (CASB), and ZTNA from the cloud.

πŸ“Œ Practical Use Case: A company uses SSE to block malicious websites and control access to SaaS apps regardless of user location.

πŸ“š Exam Objective Reference: 1.8 – Security Service Edge (SSE)

πŸ” Follow-Up: What SSE tools help enforce access control to cloud apps?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary benefit of Infrastructure as Code (IaC)?

  • Automates network and infrastructure configuration using reusable scripts
  • Replaces the need for user authentication
  • Forces all routing through BGP updates
  • Encrypts Layer 1 physical signals
A

βœ… Correct Answer: Automates network and infrastructure configuration using reusable scripts

πŸ“˜ Explanation: IaC uses code (like YAML or JSON) to automate the provisioning, configuration, and management of systems.

πŸ“Œ Practical Use Case: A DevOps team uses Terraform scripts to deploy and manage identical infrastructure across test and production environments.

πŸ“š Exam Objective Reference: 1.8 – Infrastructure as Code (IaC)

πŸ” Follow-Up: What languages or tools are commonly used for IaC?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an example of automation in Infrastructure as Code (IaC)?

  • Using templates and playbooks to configure systems
  • Performing all configurations manually
  • Replacing API endpoints with MAC addresses
  • Encrypting DNS records manually
A

βœ… Correct Answer: Using templates and playbooks to configure systems

πŸ“˜ Explanation: Automation in IaC includes using predefined templates, playbooks, or scripts to deploy and maintain infrastructure.

πŸ“Œ Practical Use Case: An engineer deploys 100 virtual machines using an Ansible playbook rather than setting them up one by one.

πŸ“š Exam Objective Reference: 1.8 – IaC (Automation)

πŸ” Follow-Up: What are the risks of configuration drift in manual setups?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does version control in IaC help with?

  • Tracking changes to configuration code and enabling rollback
  • Encrypting files on Layer 2 switches
  • Automatically connecting routers in mesh topologies
  • Setting VLAN IDs in BIOS
A

βœ… Correct Answer: Tracking changes to configuration code and enabling rollback

πŸ“˜ Explanation: Version control systems like Git store and track changes to infrastructure definitions, allowing easy collaboration and rollback.

πŸ“Œ Practical Use Case: A DevOps team uses Git to manage changes in firewall configuration scripts across environments.

πŸ“š Exam Objective Reference: 1.8 – IaC (Source Control)

πŸ” Follow-Up: How does version control improve collaboration in network teams?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is configuration drift in an IaC environment?

  • A difference between the actual configuration and the desired (coded) configuration
  • A type of DNS zone transfer error
  • A routing loop caused by a misconfigured gateway
  • A mismatch of port speeds between devices
A

βœ… Correct Answer: A difference between the actual configuration and the desired (coded) configuration

πŸ“˜ Explanation: Configuration drift happens when manual changes or untracked updates make systems deviate from their intended IaC definitions.

πŸ“Œ Practical Use Case: A developer changes a firewall rule manually, but the next IaC deployment overwrites it because it wasn’t in the code.

πŸ“š Exam Objective Reference: 1.8 – IaC (Configuration Drift)

πŸ” Follow-Up: What tools help detect and correct configuration drift?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a central repository in source control?

  • To store all code in one location accessible by team members
  • To isolate individual scripts permanently
  • To replace logging servers in real-time systems
  • To run DNS servers in containerized form
A

βœ… Correct Answer: To store all code in one location accessible by team members

πŸ“˜ Explanation: A central repository allows collaboration, backup, and version tracking across infrastructure codebases.

πŸ“Œ Practical Use Case: A team uses GitHub to store and share IaC scripts for provisioning servers and switches across regions.

πŸ“š Exam Objective Reference: 1.8 – IaC (Source Control)

πŸ” Follow-Up: How do central repositories prevent code loss or conflicts?

17
Q

What is one reason to implement IPv6 addressing in modern networks?

  • To mitigate IPv4 address exhaustion
  • To increase MAC address length
  • To replace HTTP with HTTPS
  • To eliminate all private subnets
A

βœ… Correct Answer: To mitigate IPv4 address exhaustion

πŸ“˜ Explanation: IPv6 provides a vastly larger address space (128-bit), solving the scarcity problem of IPv4 addresses.

πŸ“Œ Practical Use Case: A growing enterprise adopts IPv6 to assign globally unique addresses to thousands of IoT devices.

πŸ“š Exam Objective Reference: 1.8 – IPv6 Addressing

πŸ” Follow-Up: What are the major differences between IPv4 and IPv6 formats?

18
Q

What does dual stack mean in an IPv6 deployment?

  • Running both IPv4 and IPv6 on the same device or network
  • Doubling the DNS queries for redundancy
  • Using two NAT routers for extra protection
  • Running IPv6 and MACsec together
A

βœ… Correct Answer: Running both IPv4 and IPv6 on the same device or network

πŸ“˜ Explanation: Dual stack allows devices to communicate over both IP versions during a transition period or in hybrid environments.

πŸ“Œ Practical Use Case: A service provider enables dual stack so customers can access legacy IPv4 websites and IPv6-only services.

πŸ“š Exam Objective Reference: 1.8 – IPv6 (Compatibility)

πŸ” Follow-Up: How does dual stack differ from tunneling in IPv6 migration?

19
Q

What is the purpose of NAT64 in IPv6 environments?

  • To allow IPv6-only clients to communicate with IPv4 servers
  • To encrypt IPv6 tunnels between routers
  • To block legacy traffic on modern networks
  • To create VLANs dynamically in Layer 3 switches
A

βœ… Correct Answer: To allow IPv6-only clients to communicate with IPv4 servers

πŸ“˜ Explanation: NAT64 translates IPv6 addresses into IPv4 so modern devices can reach legacy services.

πŸ“Œ Practical Use Case: A mobile device with only an IPv6 address uses NAT64 to browse IPv4 websites like legacy banking portals.

πŸ“š Exam Objective Reference: 1.8 – IPv6 (Compatibility)

πŸ” Follow-Up: How does NAT64 differ from NAT44 and NAT46?

20
Q

What is a compatibility method for using IPv6 with IPv4 networks?

  • Tunneling
  • Replacing TCP with ICMPv6
  • Encapsulation of MAC addresses
  • Routing via DNS-only protocols
A

βœ… Correct Answer: Tunneling

πŸ“˜ Explanation: Tunneling allows IPv6 packets to be encapsulated within IPv4, enabling communication across legacy networks.

πŸ“Œ Practical Use Case: A company uses tunneling to allow IPv6-enabled applications to reach a data center that only supports IPv4.

πŸ“š Exam Objective Reference: 1.8 – IPv6 Compatibility (Tunneling)

πŸ” Follow-Up: What are two common protocols used for IPv6 tunneling?

21
Q

Which technology allows automation of upgrade and deployment tasks in a network?

  • Playbooks/templates/reusable tasks
  • MAC filtering
  • NAT pools
  • VLAN tagging
A

βœ… Correct Answer: Playbooks/templates/reusable tasks

πŸ“˜ Explanation: Playbooks and reusable templates allow repeatable automation of infrastructure deployment and updates.

πŸ“Œ Practical Use Case: An engineer uses an Ansible playbook to automatically configure new routers with security settings.

πŸ“š Exam Objective Reference: 1.8 – IaC (Automation)

πŸ” Follow-Up: What are the advantages of using playbooks over manual configuration?

22
Q

What does dynamic inventory refer to in Infrastructure as Code (IaC)?

  • Manually assigned static IP ranges
  • Autonomous routing protocols
  • Pre-configured VLAN ID templates
  • Automatically updated list of infrastructure resources
A

βœ… Correct Answer: Automatically updated list of infrastructure resources

πŸ“˜ Explanation: Dynamic inventories pull current device/resource info from cloud platforms to maintain up-to-date infrastructure definitions.

πŸ“Œ Practical Use Case: An IaC tool connects to AWS and updates its host list every time a new EC2 instance is launched.

πŸ“š Exam Objective Reference: 1.8 – IaC (Dynamic Inventory)

πŸ” Follow-Up: Which tools can be used to generate dynamic inventory from cloud platforms?

23
Q

What feature of source control helps teams avoid conflicting changes?

  • Conflict identification
  • TACACS+ encryption
  • Session persistence
  • SNMP traps
A

βœ… Correct Answer: Conflict identification

πŸ“˜ Explanation: Source control detects when two people edit the same code and flags the conflict before deployment.

πŸ“Œ Practical Use Case: A network admin sees a merge conflict when two engineers try to edit the same switch configuration script in Git.

πŸ“š Exam Objective Reference: 1.8 – IaC (Source Control)

πŸ” Follow-Up: How does conflict identification improve code reliability?

24
Q

What is a key benefit of branching in a source-controlled IaC environment?

  • Allows testing changes without affecting the main configuration
  • Increases SNMP polling rate
  • Overwrites encrypted SSH keys
  • Triggers packet capture on errors
A

βœ… Correct Answer: Allows testing changes without affecting the main configuration

πŸ“˜ Explanation: Branching enables isolated development and testing of changes without impacting production.

πŸ“Œ Practical Use Case: A team tests a new routing policy in a separate branch before pushing it to the live environment.

πŸ“š Exam Objective Reference: 1.8 – IaC (Branching)

πŸ” Follow-Up: What’s the difference between branching and forking?

25
Why is NAT64 important in IPv6-only networks? - It disables IPv6 tunneling - It replaces DNSSEC - It enables IPv6 clients to reach IPv4-only servers - It encrypts all VLAN tags
βœ… Correct Answer: It enables IPv6 clients to reach IPv4-only servers πŸ“˜ Explanation: NAT64 translates IPv6 requests to IPv4 so that IPv6-only devices can access legacy services. πŸ“Œ Practical Use Case: A mobile network uses NAT64 so smartphones with IPv6-only addresses can browse IPv4 websites. πŸ“š Exam Objective Reference: 1.8 – IPv6 Compatibility (NAT64) πŸ” Follow-Up: What other technology is typically paired with NAT64 for name resolution?
26
What does IaC improve when managing a large-scale network? - Standardization and repeatability of configurations - Manual router patching - Static ARP assignments - MAC-based firewalls
βœ… Correct Answer: Standardization and repeatability of configurations πŸ“˜ Explanation: IaC ensures that infrastructure is deployed consistently and can be reproduced or scaled without manual intervention. πŸ“Œ Practical Use Case: A company uses IaC to deploy 100 identical branch networks using the same tested configuration template. πŸ“š Exam Objective Reference: 1.8 – Infrastructure as Code (IaC) πŸ” Follow-Up: What risks are reduced by using standardized configuration templates?
27
What is a reason organizations use Zero Trust Architecture? - To replace HTTPS with HTTP - To enforce least privilege and continuous verification - To route all traffic via DNS - To extend Layer 2 segments across WAN
βœ… Correct Answer: To enforce least privilege and continuous verification πŸ“˜ Explanation: ZTA continuously verifies users and devices, ensuring that access is based on need and context, not trust zones. πŸ“Œ Practical Use Case: An employee must verify identity and device health before accessing any internal system, even from the office. πŸ“š Exam Objective Reference: 1.8 – Zero Trust Architecture (ZTA) πŸ” Follow-Up: How does ZTA differ from perimeter-based network security models?