Objectives 3.5 Flashcards

(26 cards)

1
Q

Which of the following best describes a Site-to-Site VPN?
- Allows browser-based access without VPN client software
- Connects individual remote users securely to a corporate network
- Encrypts only the application traffic between endpoints
- Connects entire networks securely over the internet

A

Connects entire networks securely over the internet | Practical Use: Used by companies with multiple offices that need secure inter-site communication. | Explanation: Site-to-Site VPNs create encrypted tunnels between branch or remote offices, making them appear as part of the same LAN. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What protocol suite is commonly used to secure Site-to-Site VPN tunnels?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Client-to-Site VPN primarily used for?
- Replacing VLANs within a corporate network
- Connecting data centers to each other
- Providing secure access without a client
- Allowing remote employees secure access to corporate resources

A

Allowing remote employees secure access to corporate resources | Practical Use: Remote staff use VPN clients on laptops to access internal company servers. | Explanation: Client-to-Site VPN (Remote Access VPN) uses installed client software to connect securely to the network. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: How does a Client-to-Site VPN differ from a Site-to-Site VPN?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following best describes a Clientless VPN?
- Encrypts only split-tunnel traffic
- Requires installation of VPN client software
- Uses Telnet for secure access
- Provides access via a web browser without a client

A

Provides access via a web browser without a client | Practical Use: Employees accessing web apps securely from a hotel or shared computer. | Explanation: Clientless VPNs run in the browser, ideal for limited remote access to applications without installing software. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is a security limitation of Clientless VPNs compared to Client-to-Site VPNs?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is a key characteristic of a Split Tunnel VPN?
- Only corporate traffic goes through the VPN, internet traffic bypasses it
- Encrypts both headers and payloads of all traffic
- All traffic is routed through the corporate VPN
- Requires a jump host for access

A

Only corporate traffic goes through the VPN, internet traffic bypasses it | Practical Use: Remote workers use corporate VPN for work apps while personal traffic goes directly to the internet. | Explanation: Split tunneling reduces VPN gateway load but can expose non-corporate traffic to risks. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is a major security risk of split tunneling?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which configuration ensures that all client traffic passes through the VPN for inspection and encryption?
- Full Tunnel
- Site-to-Site
- Clientless VPN
- Split Tunnel

A

Full Tunnel | Practical Use: Organizations enforcing strict security policies route all remote traffic through the VPN. | Explanation: Full tunnel VPNs provide more security at the cost of performance and bandwidth. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why might performance decrease in a full tunnel VPN?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which remote connection method encrypts sessions and replaces insecure Telnet?
- Console
- API
- GUI
- SSH

A

SSH | Practical Use: Admin securely logging into a router or Linux server. | Explanation: SSH provides encrypted remote login and secure management functions. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What default TCP port does SSH use?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which management method provides a visual dashboard for configuration?
- GUI
- API
- Console
- SSH

A

GUI | Practical Use: Network admins configuring firewalls via a web interface. | Explanation: GUIs simplify management with point-and-click interfaces but can expose vulnerabilities if not secured. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is a security disadvantage of GUIs compared to SSH?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which method allows programmatic interaction with network devices for automation?
- Console
- SSH
- GUI
- API

A

API | Practical Use: Automating switch configuration with Python scripts. | Explanation: APIs enable integration, automation, and custom management solutions. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: How does API use enhance scalability in modern networks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access method provides direct, physical connectivity to a device for setup or recovery?
- Console
- GUI
- SSH
- API

A

Console | Practical Use: Technician configuring a new router via console cable before it joins the network. | Explanation: Console access is essential when remote connectivity is unavailable. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is console access especially critical during outages?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main purpose of a Jump Box/Host?
- Acts as a secure intermediary between admins and sensitive systems
- Provides a direct tunnel to a client’s workstation
- Encrypts all VPN traffic
- Hosts DNS queries for private zones

A

Acts as a secure intermediary between admins and sensitive systems | Practical Use: Admins connect to a jump host in the DMZ before reaching internal servers. | Explanation: Jump boxes control access and reduce attack surfaces by segmenting trust zones. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is a jump host commonly placed in a DMZ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which management method uses the same network path as normal traffic?
- In-band management
- Console
- Jump host
- Out-of-band management

A

In-band management | Practical Use: Admins use SSH or HTTPS over the production network for device management. | Explanation: In-band relies on the operational network; if the network fails, access is lost. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is the main limitation of in-band management during outages?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which management method provides a dedicated channel for device administration, separate from production traffic?
- Out-of-band management
- In-band management
- Jump host
- API

A

Out-of-band management | Practical Use: Admins access routers via dedicated management ports even if the main network fails. | Explanation: Out-of-band ensures reliability and security independent of primary data paths. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is out-of-band management considered more secure?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following best compares In-band vs. Out-of-band management?
- In-band is secure, Out-of-band is not
- Out-of-band requires VPN, while in-band does not
- Both use dedicated management channels
- Out-of-band uses a separate path
- In-band uses production traffic

A

In-band uses production traffic; Out-of-band uses a separate path | Practical Use: Using SSH in-band vs. using a console server for out-of-band. | Explanation: In-band depends on network health, while out-of-band provides redundancy and secure fallback. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: In what scenario would out-of-band management be absolutely required?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company has two branch offices that must securely share resources over the public internet. The admin wants the branches to appear as if they are on the same LAN. Which solution should be implemented?
- Client-to-Site VPN
- Split Tunnel VPN
- Site-to-Site VPN
- Clientless VPN

A

Site-to-Site VPN | Practical Use: Used to connect multiple offices securely across geographic distances. | Explanation: A Site-to-Site VPN builds an encrypted tunnel between networks, not just individual users. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: How does a Site-to-Site VPN differ from a leased private line (like MPLS)?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An employee working remotely installs VPN software and connects to the corporate LAN. They can access internal file servers as if they were in the office. What type of VPN are they using?
- Clientless VPN
- Client-to-Site VPN
- Full Tunnel VPN
- Split Tunnel VPN

A

Client-to-Site VPN | Practical Use: Remote workers securely connect to HQ networks from laptops. | Explanation: Client-to-Site requires dedicated software to authenticate and encrypt communications. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why might IT prefer Client-to-Site over Clientless VPN for remote developers?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A contractor needs quick access to a company’s intranet portal but cannot install software on their device. Which solution is most appropriate?
- Client-to-Site VPN
- Site-to-Site VPN
- Clientless VPN
- Split Tunnel VPN

A

Clientless VPN | Practical Use: Contractors or vendors access web apps securely without client software. | Explanation: Clientless VPNs allow secure browser-based access but usually limit what resources can be reached. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is a security trade-off of using a clientless VPN?

17
Q

A remote employee reports that while connected to the VPN, they can access corporate servers but their YouTube streaming bypasses the tunnel and uses local internet. Which configuration is this?
- Clientless VPN
- Site-to-Site VPN
- Full Tunnel
- Split Tunnel

A

Split Tunnel | Practical Use: Reduces load on the corporate VPN by sending only work traffic through it. | Explanation: Split tunneling separates corporate and non-corporate traffic, improving performance but creating risks. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why might split tunneling expose the corporate network to security threats?

18
Q

An organization mandates that all remote traffic, including internet browsing, be routed through its VPN for monitoring and compliance. Which configuration is required?
- Full Tunnel
- Site-to-Site VPN
- Clientless VPN
- Split Tunnel

A

Full Tunnel | Practical Use: Companies with strict security policies force all traffic through their firewall. | Explanation: Full tunnel VPNs increase security but can slow user experience due to bandwidth load. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: In what scenario might full tunneling cause user complaints?

19
Q

A network administrator needs to remotely manage a router over an unsecured public Wi-Fi connection. Which method is the most secure?
- Telnet
- SSH
- Console
- GUI

A

SSH | Practical Use: Securely logging into routers/switches even over untrusted networks. | Explanation: SSH encrypts traffic, unlike Telnet, preventing credential theft. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is SSH preferred over Telnet for remote management?

20
Q

Which management method would a new junior admin most likely use to configure a firewall because of its ease of use?
- Console
- GUI
- SSH
- API

A

GUI | Practical Use: Visual dashboards for simplified configuration. | Explanation: GUIs are intuitive but can be less efficient and more vulnerable compared to CLI-based methods. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why might senior admins prefer CLI or SSH over GUIs in enterprise environments?

21
Q

An admin wants to automate switch configurations across hundreds of devices with Python scripts. Which method should they use?
- SSH
- Console
- GUI
- API

A

API | Practical Use: Automating configurations in SDN or cloud-based networks. | Explanation: APIs enable programmatic control, ideal for scaling network operations. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: How does API-driven management differ from manual CLI commands?

22
Q

During a network outage, remote access fails. Which method allows a technician to still configure the switch directly on-site?
- API
- Console
- SSH
- GUI

A

Console | Practical Use: Initial setup and recovery when remote management isn’t possible. | Explanation: Console provides physical, direct access independent of the network. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is console access critical during device initialization?

23
Q

Security policy requires admins to first authenticate into a controlled server before accessing devices in the DMZ. What is this setup called?
- Jump box/host
- API gateway
- Console server
- Split Tunnel VPN

A

Jump box/host | Practical Use: Admins connect through a secured host before managing critical systems. | Explanation: Jump boxes reduce attack surface by controlling privileged access pathways. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: Why is a jump host often placed in the DMZ instead of the internal LAN?

24
Q

An administrator is managing a router using SSH over the same interface that handles production traffic. What type of management is this?
- In-band
- Out-of-band
- Console
- API

A

In-band | Practical Use: Day-to-day management using the operational network itself. | Explanation: In-band relies on the device’s main network path; management is lost if the path fails. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: What is the biggest risk of relying solely on in-band management?

25
A network outage occurs, but administrators can still access devices using dedicated management ports. What type of management is this? - In-band - API - Out-of-band - Jump host
Out-of-band | Practical Use: Accessing routers through a console server when production traffic is down. | Explanation: Out-of-band provides an independent path for reliability and recovery. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: How does out-of-band improve uptime compared to in-band?
26
Which statement correctly compares in-band and out-of-band management? - In-band is always more secure than out-of-band - In-band uses production traffic; out-of-band uses a separate path - Out-of-band requires SSH, in-band requires Telnet - In-band is independent of production traffic; out-of-band is not
In-band uses production traffic; out-of-band uses a separate path | Practical Use: Using SSH over LAN vs. console server in case of failure. | Explanation: In-band depends on production paths, while out-of-band provides redundancy and reliability. | Objective: 3.5 – Network Access and Management Methods | Follow-up Question: In what type of failure scenario is out-of-band management essential?