Network Implementations Flashcards

Day9_Advanced Switching (18 cards)

1
Q

What does an Intrusion Detection System (IDS) do?

A

IDS is a device that monitors for malicious activity, as well as any kind of policy violation.

It collects the data and then can generate a report in terms of what is actually going on with respect to your network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an Intrusion Prevention System (IPS) do?

A

IPS continuously monitors network traffic for malicious activity and takes automated actions to prevent threats in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compare Network Intrusion Detection System (NIDS) vs Host-based Intrusion Detection System (HIDS)?

A
  • NIDS is a physical device that typically sits at the edge of your network and is designed to protect the entire network, whereas a
  • HIDS is software that you install on any given client system to enhance the overall protection of your environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Signature-based intrusion detection systems?

A

Signature-based IDS identifies threats by comparing network traffic or system activity against a database of known attack patterns, referred to as signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Anomaly-based intrusion detection systems?

A

Anomaly-based IDS identifies unusual system behaviors that may indicate threats in a given network.

It can take some time for an intrusion detection system to understand what is normal in your environment; in that learning period the Anomaly-based method can generate a lot of false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Voice over Internet Protocol (VoIP)?

A

VoIP a technology that allows voice communication over the internet instead of traditional phone lines. It converts analog voice signals into digital data packets and transmits them using IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Session Initiation Protocol (SIP) do in relation to VoIP?

A

SIP is simply the protocol that is the carrier for VoIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VoIP gateway?

A

VoIP gateway a hardware device that converts voice signals between the phone systems and digital VoIP networks, enabling seamless communication across both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a Private Branch Exchange (PBX) in a VoIP environment?

A

PBX handles the VoIP-to-analog signal conversion that is necessary to make calls on the Public Switched Telephone Network (PSTN)

The PBX was the device that also acted as a switch to route those calls to the correct extensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some benefits of a VoIP network?

A

This is a very reliable infrastructure because it just uses standard Ethernet networks, which in turn makes it very cost-effective.

You don’t have to purchase any additional equipment other than the phones themselves, if you are still using traditional analog phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Trunking on a VoIP network?

A

Trunking on a VoIP network refers to the consolidation of multiple voice channels into a single digital connection, allowing efficient and scalable communication over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does an On-premises VoIP configuration look like?

A

On-premises configuration:

  • Private Branch Exchange (PBX)
  • A server running SIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Wi-Fi Protected Access 2 (WPA2) encryption?

A

WPA2 replaced the vulnerability of WEP and interim WPA protocols. Its most notable features include AES encryption, a 4-way handshake, backward compatibility, and two-modes of operation (personal & enterprise)

WPA2 Personal uses a pre-shared key (PSK + AES) | Enterprise provides user-level server authentication for enterprise-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Wi-Fi Protected Access 3 (WPA3) encryption?

A

WPA3 is the current security protocol, offering new features like stronger encryption, enhanced protection against password cracking and brute force attacks, as well as, simplified setup for smart devices (Wi-Fi easy connect)

WPA3’s main improvement over WPA2 is Simultaneous Authentication of Equals (SAE) | SAE provides forward secrecy, mutual authentication, dynamic key generation, and a few additional features making WPA3 the safest encryption option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Administrative Distance?

A

Administrative distance helps the router decide which route to install in the routing table when there are competing paths from different routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Prefix Length?

A

Prefix length refers to the number of bits in an IP address that represent the network portion of the address

17
Q

What is Metric in the context of route selection?

A

Metric a value used by routing protocols to determine the best path to a destination network.

18
Q

What is the Switch Virtual Interface (SVI)?

A

SVI a virtual Layer 3 interface configured on a Layer 2 switch to enable IP-based communication between VLANs or with external networks