Modern Network Environments Flashcards

Day11_Network Services (55 cards)

1
Q

What is Syslog?

A

Syslog a standardized protocol that is used widely on network devices and servers to send status, diagnostic, and event information from network nodes to a centralized server.

A syslog agent or process runs on these devices and can be configured to send syslog messages to a centralized server | Depending on the Syslog server implementation used, the server may provide data analysis, log aggregration and search functions, and alerting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main purpose of software-defined networking?

A

To separate the control plane from the data plane

This separation allows for centralized management and control of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the data plane refer to in networking?

A

The data plane is responsible for moving data through the network

It is distinct from the control plane, which makes decisions about data movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the control plane responsible for?

A

The control plane decides how data moves through the network

It involves examining incoming data against routing tables to choose the best path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Components of SDN

A
  • Controller – The brain that decides how traffic flows
  • Switches/Routers – The muscles that follow instructions
  • Apps – Tools that tell the controller what’s needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In traditional networking, what are the two main jobs of hardware devices like switches and routers?

A

In traditional networking, the (2) main jobs of hardware devices are:

  • Moving data through the network
  • Deciding how the data moves through the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SDN vs Traditional Networking

A
  • Traditional: each device (router/switch) makes its own decisions
  • SDN: a central controller makes decisions for all devices.

Analogy: SDN is like a city where one traffic control center manages all traffic lights, instead of each light acting on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the backhaul in traditional networking?

A

Backhaul the process of routing branch or remote client traffic services through a central office, or data center before reaching cloud services

This can lead to congestion and poor performance | SDN is the solution for this type of issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some benefits of SDN?

A
  • Easy to automate
  • Centralized control
  • Flexible and scalable
  • Improves network agility and security
  • Great for cloud and virtual environments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is application awareness in software-defined networking?

A

The ability to filter and prioritize traffic based on the application making a request

This allows for better traffic management compared to traditional networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is zero-touch provisioning?

A

Zero-touch provisioning an automated process that allows network devices to configure themselves with minimal, or no manual intervention once powered on and connected to a network

This feature enhances efficiency in managing network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is centralized policy management in software-defined networking?

A

Centralized policy management allows for consistent application of policies across the network, reducing the chance of human-errors from manual configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does transport agnosticism mean in software-defined networking?

A

Transport agnosticism means the network can operate independently of the underlying transport technologies without being tied to any specific one

This flexibility allows SDN to dynamically route traffic across diverse mediums based on performance, cost, or policy, rather than physical constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of the application in software-defined networking?

A

To configure devices and provide an interface for administrators

It collects statistics and manages network configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main advantage of using a single dashboard in SD-WAN?

A

Single dashboard centralizes control and reduces complexity in managing all connections and devices in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main function of a controller in software-defined networking?

A

Its function is to process information from the application and decide how packets should be routed

It translates commands from the application into configuration for physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is one of the key benefits of SD-WAN for remote users?

A

One key benefit is providing direct connections to cloud services for users without routing traffic through the main office

This improves application performance and user experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or false: In software-defined networking, the physical networking devices are configured directly by administrators.

A

FALSE

They are configured through a central application and controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Virtual eXtensible Local Area Network (VXLAN)?

A

VXLAN a network virtualization technology that encapsulates layer 2 ethernet frames into layer 3 packets, tunneling layer 2 addresses inside layer 3 traffic

This allows for the creation of virtual networks that can span across multiple physical networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the main parts of VXLAN?

A
  • Overlay Network
    Virtual Layer 2 network
  • Underlay Network
    Physical Layer 3 transport (IP)
  • VNI (VXLAN Network Identifier) –
    24-bit tag for each virtual segment
  • VTEP (Virtual Tunnel Endpoint) – Encapsulates and decapsulates traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does VXLAN work?

A
  • A VM sends a packet to another VM.
  • The Virtual Tunnel Endpoint (VTEP) wraps the Ethernet frame in a UDP/IP packet.
  • It travels across the Layer 3 network.
  • The destination VTEP unwraps it and delivers it locally.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or false: VXLAN allows for a theoretical maximum of 16 million VLANs.

A

TRUE

This is a significant increase compared to the traditional VLAN limit of 4096.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Data Center Interconnect (DCI)?

A

DCI a high-capacity networking technology that links two or more data centers to enable seamless data sharing, workload mobility, backup, and disaster recovery across geographic locations.

24
Q

What is Zero Trust Architecture (ZTA)?

A

ZTA a cybersecurity framework that assumes no user, device, or system—inside or outside the network—should be trusted by default

Every access request must be continuously verified based on identity, context, and risk

25
What is the significance of **policy-based authentication** in ZTA?
**Policy-based authentication** eliminates the concept of implicit trust based on network location; it requires **continuous verification** of user identity, device posture, location, and other real-time signals before access is permitted. ## Footnote Policy-based authentication ensures that access to resources is granted only after a rigorous evaluation of multiple contextual factors.
26
What is **authorization** in ZTA?
**Authorization** the process of determining whether a user, device, or application has the **explicit right to access** a specific resource—based on dynamic, context-aware policies rather than static trust assumptions
27
What are some key components of **Identity and Access Management** in ZTA?
* Identity governance * Logging and auditing * Multi-factor authentication ## Footnote These components help in verifying identities and maintaining security.
28
What is **Secure Access Service Edge** (SASE)?
**SASE** merges *networking* (like SD-WAN) and *security* (like firewalls, Zero Trust) into **one** cloud-delivered service.
29
List the components of **SASE**.
* SD-WAN - smart routing across networks * Secure web gateway - filters harmful web traffic * Firewall as a Service - cloud based firewall * Cloud access security broker (CASB) - protects cloud app usage * Zero trust network access (ZTNA) - verifies every user/device ## Footnote These components work together to secure cloud services and network access.
30
What advantage does **SASE** provide in terms of network performance?
Increases network performance by eliminating backhaul ## Footnote Direct connections to the cloud from clients enhance speed and efficiency.
31
What is the main benefit of using a **common interface** in SASE?
Main benefit of using a common interface in SASE is **centralized management and control** over network and security functions from a single, unified platform ## Footnote A single interface allows for better visibility and control across all network connections.
32
What is a key advantage of **SASE** regarding user experience?
**SASE** enhances user experience by providing a common interface and reducing the need for integration with various hardware ## Footnote This translates into: * Better bandwidth availability * Improved response times
33
What is **Security Service Edge** (SSE)?
**SSE** a cloud-delivered framework that provides secure access to web, cloud, and private applications. SSE is a subset of SASE, focused **solely on cloud-delivered security** without changing network architecture ## Footnote SSE integrates & consolidates multiple security services such as: * Zero Trust Network Access (ZTNA) * Secure Web Gateway (SWG) * Cloud Access Security Broker (CASB) * Firewall-as-a-Service (FWaaS)
34
What does **Infrastructure as Code (IaC)** automate?
**IaC** is the provisioning and operations of infrastructure (servers, networks, etc.) using code or templates in the form of *JSON* or *YAML* ## Footnote IaC allows for the management of **virtual machines** and networking through code (automated, repeatable, and version-controlled) instead of manual processes.
35
Fill in the blank: **Infrastructure as Code (IaC)** is used to create __________ instead of doing it manually.
virtual machines ## Footnote IaC streamlines the process of setting up and managing cloud infrastructure | **Code** allows for rapid scaling and setup of machines, which is crucial for cloud providers.
36
What are typical components managed by **Infrastructure as Code (IaC)**?
* OS(s) * Storage * Processing * Databases ## Footnote These components are essential for setting up virtual machines in the cloud.
37
True or false: **Infrastructure as Code (IaC)** eliminates errors when configuring new environments.
TRUE ## Footnote Using code for setup ensures consistency and reduces the likelihood of human error.
38
Why is IaC useful?
- **Scalability** – Easily replicate environments - **Consistency** – No manual errors - **Speed** – Fast setup and deployment - **Version Control** – Track important changes in software
39
What does IaC help avoid when managing applications at scale?
**IaC** allows for quick configuration changes across multiple VMs without inefficient manual setup and management
40
What is configuration **drift** **vs** configuration **compliance** in the context of IaC?
**Configuration drift** occurs when the actual state of your infrastructure diverges from the desired state defined in your IaC templates **Configuration compliance** refers to the practice of ensuring that infrastructure resources are consistently deployed and maintained according to predefined security, operational, and regulatory standards
41
What are **Upgrades** in the context of IaC?
**Upgrades** refer to the process of *updating infrastructure components, IaC tools, or configurations to newer versions*—while maintaining consistency, automation, and version control.
42
What are **Dynamic Inventories** in the context of IaC?
**Dynamic inventories** refer to the automated, *real-time generation of infrastructure resource lists*—such as servers, VMs, containers, or cloud instances
43
What is a **Central Repository** in the context of IaC?
**Central repository** a *version-controlled, shared location*—typically hosted on platforms like GitHub, GitLab
44
What is **Version Control**?
**Version control** is *tracking and managing changes to code, configurations, or documents over time*—allowing teams to collaborate, revert to previous states, and maintain a history of all modifications
45
What is **Conflict Identification** in the context of IaC?
**Conflict identification** refers to the process of detecting inconsistencies, overlaps, or incompatible changes between different versions, modules, or deployments of IaC ## Footnote These conflicts can arise during collaboration, automation, or integration—and if left unresolved, they can lead to failed deployments, drift, or security vulnerabilities
46
What is **Branching** in the context of IaC?
**Branching** refers to the use of version control branches (typically in Git) to isolate, test, and manage changes to infrastructure code before merging them into the main codebase
47
What is ***Tunneling*** in the context of IPv6?
**Tunneling** refers to the technique of *encapsulating IPv6 packets **within** IPv4 packets* to enable IPv6 communication over an existing IPv4 infrastructure
48
What is ***dual stack***?
**Dual stack** a network configuration where devices and systems run **both IPv4 and IPv6 protocols simultaneously**.
49
What is ***NAT64?***
**NAT64** a *network translation mechanism that **enables communication between IPv6-only clients and IPv4-only servers** by translating IPv6 packets into IPv4 packets—and vice versa*—using a gateway device
50
In software-defined networking (SDN) this component is responsible for the actual forwarding of data on the network media.
Physical network device
51
In traditional networking environments, remote users connect to the corporate network where data would be retrieved from cloud services. *This connection is known as the backhaul and creates a potential bottleneck*, when multiple users are utilizing the cloud services. **What technology eliminates the backhaul and provides remote users with direct connections to the corporate cloud services**?
SD-WAN
52
In the zero trust architecture, authentication information is stored and retrieved from only one source. What is the term used to describe this concept?
Single source of truth
53
You work as a cloud admin for a large cloud provider that requires you to **create multiple virtual environments for your development team and scale them to thousands of instances. You want to maintain absolute consistency and need to deploy them as quickly as possible**. Which technology fulfills these requirements?
Infrastructure as Code (IaC)
54
As a cloud admin, you have **several servers scattered in data centers in different locations around the city. You want to connect these servers in such a way that they virtually appear directly connected to the same LAN**. The locations are currently connected with a TCP/IP network, which must be used for the connection. What technology would you use to connect these servers and fulfill these networking requirements?
Virtual eXtensible Local Area Network (VXLAN)
55
Among the components of the secure access service edge (SASE) which offers malware detection?
Secure web gateway (SWG)