Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
72 Cards in this Set
- Front
- Back
What are the two methods of updating routing tables?
|
dynamic and static routing
|
|
What are the 3 ways to use routing to send data over a network?
|
unicasting, multicasting, and broadcasting
|
|
What sort of address is used for multicasting?
|
a Class D address
|
|
What is the address range of a Class D address?
|
224-239
|
|
What is demand-dial routing?
|
routing along non-permanent routes (ISDN, PPP, etc.)
|
|
What are the 2 states of a demand-dial interface?
|
connected and disconnected
|
|
What are the 2 types of connections that can be made on a demand-dial interface?
|
on-demand connections and persistent connections
|
|
What is a connection establishment delay?
|
the length of time it takes to set up a demand-dial connection
|
|
What sort of routing do on-demand connections use?
|
static routing
|
|
What sort of routing do persistent connections use?
|
dynamic routing
|
|
What requirement does dynamic routing have that static routing does not?
|
all routers have to use the same routing protocol
|
|
What are the 2 most common routing protocols?
|
RIP and OSPF
|
|
What are the 2 components of a dynamic routing protocol?
|
the routing protocol and the routing algorithm
|
|
What are the 2 most common types of routing protocols?
|
distance vector and link state
|
|
What type of routing algorithm is RIP?
|
distance vector
|
|
What type of routing algorithm is OSPF?
|
link state
|
|
What does RIP use to determine a route?
|
hop count
|
|
How many hops will RIP support?
|
up to 15 hops
|
|
What type of routing protocols should be used if using CIDR?
|
distance vector routing protocols
|
|
What type of routing protocols should be used if using multicasting to update routing tables?
|
distance vector routing protocols
|
|
What type of routing protocols should be used if simple password authentication is being used between routers?
|
distance vector routing protocols
|
|
How does an OSPF router advertise its presence?
|
it sends hello packets to neighbors on power up
|
|
What type of routing protocol provides faster convergence?
|
link state routing protocols
|
|
What does OSPF advertise instead of advertising all routes?
|
changes
|
|
What type of routing protocol should be used if route changes are frequent?
|
link state routing protocols
|
|
What type of routing protocol should be used if the network includes redundant paths?
|
link state routing protocols
|
|
What type of routing protocol should be used if there are more than 50 subnets in the internetwork?
|
link state routing protocols
|
|
What type of routing protocol should be used if you want to assign specific costs to routes?
|
link state routing protocols
|
|
When should RIPv2 broadcasts be used as the RIP outgoing protocol?
|
if there are RIPv1 routers on the network
|
|
When should RIPv2 multicasts be used as the RIP outgoing protocol?
|
when there are only RIPv2 routers or it is a demand-dial interface
|
|
When should RIP v1 and v2 be used as the RIP incoming protocol?
|
when there are both RIP v1 and v2 routers on the network
|
|
When should RIP v2 only be used as the RIP incoming protocol?
|
if there are only v2 routers or it is a demand-dial interface
|
|
How is the default route designated in a routing table?
|
0.0.0.0
|
|
What subnet mask do host routes in a routing table have?
|
255.255.255.255
|
|
What subnet mask do host routes in a routing table have?
|
0.0.0.0
|
|
In a routing table, what does a gateway entry represent?
|
the IP address of the next router in a route
|
|
In a routing table, what does a metric represent?
|
the relative cost of a route
|
|
In a routing table, which is better, a high metric or a low metric?
|
low metric
|
|
What are the two types of routes in a routing table?
|
temporary and persistent
|
|
What command will display the routing table?
|
route print
|
|
What command is used to add a route to a routing table?
|
route add
|
|
What command is used to delete a route from a routing table?
|
route delete
|
|
What command is used to modify a route in a routing table?
|
route change
|
|
What command is used to add a persistent route to a routing table?
|
route -p add
|
|
What command is used to display the IPv6 routing table?
|
route print -6
|
|
How do IPv6 routers advertise their presence and autoconfiguration information to other subnet hosts?
|
by sending Router Advertisement messages
|
|
What OSI layer does IPSec operate at?
|
the Network layer
|
|
How many IPSec policies can be configured on a computer?
|
only one--but the policy can have multiple rules
|
|
What are the two IPSec modes (not security association modes)?
|
main mode and quick mode
|
|
What are the 3 main mode authentication methods for IPSec filter rules?
|
preshared keys, digital certificates, and Kerberos v5
|
|
Where are preshared IPSec keys stored?
|
in the registry
|
|
What limitation exists for using Kerberos v5 as the IPSec authentication method?
|
the endpoints must be in the same forest
|
|
What IPSec encryption algorithm has been updated for Server 2008?
|
AES
|
|
What key exchange protocol does Server 2008 use for IPSec?
|
2048-bit Diffie-Hillmen
|
|
What are the two IPSec security association modes?
|
transport mode and tunnel mode
|
|
Which IPSec security association mode requires more configuration?
|
tunnel mode
|
|
Which IPSec security association mode is more commonly used?
|
transport mode
|
|
What does IPSec Transport Mode do?
|
encrypts UDP/TCP header and payload, but leaves IP header unencrypted
|
|
How does IPSec tunnel mode differ from transport mode?
|
tunnel mode encrypts the entire packet as the payload for another packet
|
|
What two protocols does IPSec use to create and manage keys?
|
Internet Security Association Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
|
|
What 2 protocols does IPSec use to to provide data and identity protection for packets?
|
Authentication Header (AH) and Encapsulating Security Payload (ESP)
|
|
Which provides better performance, Authentication Header or Encapsulating Security Payload?
|
Authentication Header
|
|
What protocol is required for IPSec to tunnel through a NAT?
|
Encapsulating Security Payload
|
|
What are the 2 main methods of configuring IPSec?
|
through Group Policy or with Windows Firewall with Advanced Security
|
|
What are the 5 main components of IPSec rules?
|
filter list, filter action, authentication method, tunnel endpoint, and connection type
|
|
What are the 3 options for an IPSec filter action?
|
permit, block, or secure
|
|
What is the default rule in IPSec?
|
a rule used in XP/2003 whenever a computer requests secure communications and doesn't fall under an existing rule
|
|
What OS's can use the IPSec default rule?
|
Windows XP and Server 2003
|
|
What are the 3 pre-generated IPSec policies?
|
Client (Respond Only), Server (Request Security), and Secure Server (Require Security)
|
|
Why should you create new IPSec policies rather than modify the pre-generated ones?
|
the pre-generated policies will be replaced whenever you update the OS
|
|
What are the two IPSec-related netsh contexts?
|
netsh ipsec (for XP/2003) and netsh advfirewall (2008)
|
|
How can IPSec be used to isolate servers and domains?
|
require security on inbound traffic and request security on outbound traffic
|