• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
What are the two methods of updating routing tables?
dynamic and static routing
What are the 3 ways to use routing to send data over a network?
unicasting, multicasting, and broadcasting
What sort of address is used for multicasting?
a Class D address
What is the address range of a Class D address?
224-239
What is demand-dial routing?
routing along non-permanent routes (ISDN, PPP, etc.)
What are the 2 states of a demand-dial interface?
connected and disconnected
What are the 2 types of connections that can be made on a demand-dial interface?
on-demand connections and persistent connections
What is a connection establishment delay?
the length of time it takes to set up a demand-dial connection
What sort of routing do on-demand connections use?
static routing
What sort of routing do persistent connections use?
dynamic routing
What requirement does dynamic routing have that static routing does not?
all routers have to use the same routing protocol
What are the 2 most common routing protocols?
RIP and OSPF
What are the 2 components of a dynamic routing protocol?
the routing protocol and the routing algorithm
What are the 2 most common types of routing protocols?
distance vector and link state
What type of routing algorithm is RIP?
distance vector
What type of routing algorithm is OSPF?
link state
What does RIP use to determine a route?
hop count
How many hops will RIP support?
up to 15 hops
What type of routing protocols should be used if using CIDR?
distance vector routing protocols
What type of routing protocols should be used if using multicasting to update routing tables?
distance vector routing protocols
What type of routing protocols should be used if simple password authentication is being used between routers?
distance vector routing protocols
How does an OSPF router advertise its presence?
it sends hello packets to neighbors on power up
What type of routing protocol provides faster convergence?
link state routing protocols
What does OSPF advertise instead of advertising all routes?
changes
What type of routing protocol should be used if route changes are frequent?
link state routing protocols
What type of routing protocol should be used if the network includes redundant paths?
link state routing protocols
What type of routing protocol should be used if there are more than 50 subnets in the internetwork?
link state routing protocols
What type of routing protocol should be used if you want to assign specific costs to routes?
link state routing protocols
When should RIPv2 broadcasts be used as the RIP outgoing protocol?
if there are RIPv1 routers on the network
When should RIPv2 multicasts be used as the RIP outgoing protocol?
when there are only RIPv2 routers or it is a demand-dial interface
When should RIP v1 and v2 be used as the RIP incoming protocol?
when there are both RIP v1 and v2 routers on the network
When should RIP v2 only be used as the RIP incoming protocol?
if there are only v2 routers or it is a demand-dial interface
How is the default route designated in a routing table?
0.0.0.0
What subnet mask do host routes in a routing table have?
255.255.255.255
What subnet mask do host routes in a routing table have?
0.0.0.0
In a routing table, what does a gateway entry represent?
the IP address of the next router in a route
In a routing table, what does a metric represent?
the relative cost of a route
In a routing table, which is better, a high metric or a low metric?
low metric
What are the two types of routes in a routing table?
temporary and persistent
What command will display the routing table?
route print
What command is used to add a route to a routing table?
route add
What command is used to delete a route from a routing table?
route delete
What command is used to modify a route in a routing table?
route change
What command is used to add a persistent route to a routing table?
route -p add
What command is used to display the IPv6 routing table?
route print -6
How do IPv6 routers advertise their presence and autoconfiguration information to other subnet hosts?
by sending Router Advertisement messages
What OSI layer does IPSec operate at?
the Network layer
How many IPSec policies can be configured on a computer?
only one--but the policy can have multiple rules
What are the two IPSec modes (not security association modes)?
main mode and quick mode
What are the 3 main mode authentication methods for IPSec filter rules?
preshared keys, digital certificates, and Kerberos v5
Where are preshared IPSec keys stored?
in the registry
What limitation exists for using Kerberos v5 as the IPSec authentication method?
the endpoints must be in the same forest
What IPSec encryption algorithm has been updated for Server 2008?
AES
What key exchange protocol does Server 2008 use for IPSec?
2048-bit Diffie-Hillmen
What are the two IPSec security association modes?
transport mode and tunnel mode
Which IPSec security association mode requires more configuration?
tunnel mode
Which IPSec security association mode is more commonly used?
transport mode
What does IPSec Transport Mode do?
encrypts UDP/TCP header and payload, but leaves IP header unencrypted
How does IPSec tunnel mode differ from transport mode?
tunnel mode encrypts the entire packet as the payload for another packet
What two protocols does IPSec use to create and manage keys?
Internet Security Association Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
What 2 protocols does IPSec use to to provide data and identity protection for packets?
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Which provides better performance, Authentication Header or Encapsulating Security Payload?
Authentication Header
What protocol is required for IPSec to tunnel through a NAT?
Encapsulating Security Payload
What are the 2 main methods of configuring IPSec?
through Group Policy or with Windows Firewall with Advanced Security
What are the 5 main components of IPSec rules?
filter list, filter action, authentication method, tunnel endpoint, and connection type
What are the 3 options for an IPSec filter action?
permit, block, or secure
What is the default rule in IPSec?
a rule used in XP/2003 whenever a computer requests secure communications and doesn't fall under an existing rule
What OS's can use the IPSec default rule?
Windows XP and Server 2003
What are the 3 pre-generated IPSec policies?
Client (Respond Only), Server (Request Security), and Secure Server (Require Security)
Why should you create new IPSec policies rather than modify the pre-generated ones?
the pre-generated policies will be replaced whenever you update the OS
What are the two IPSec-related netsh contexts?
netsh ipsec (for XP/2003) and netsh advfirewall (2008)
How can IPSec be used to isolate servers and domains?
require security on inbound traffic and request security on outbound traffic