Cuestionario 2 Sulucion

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

1. Which two options describe a WAN? (Choose two.

A WAN is owned and managed by an organization or home user.

A WAN provides networking services over large geographical areas. WAN

services are provided for a fee.

WANs providers offer low bandwidth speeds over short—distances.

WANs guarantee security between the endpoints.

2. Which topology type describes the virtual connection between source to destination?

cabling topology
physical topology

O logical topology

wired topology

3. Which type of WAN network design is the most fault—tolerant?

dual—homed topology

O fully meshed topology

hub—and—spoke topology

partially meshed topology

point—to—point topology

4. Which is a type of WAN carrier connection that provides redundancy?

O dual—carrier WAN connection

single—carrier WAN connection


1. Which two statements about the WAN OSI Layer 1 are true? (Choose two.)

It describes how data will be encapsulated into a frame.

It describes the electrical, mechanical, and operational components needed to transmit bits. It

includes protocols such as PPP, HDLC, and Ethernet.

It includes protocols such as SDH, SONET, and DWDM.

2. Which WAN term demes the point where the subscriber connects to the service providers network.

Customer Premises Equipment (CPE) Data

Communications Equipment (DCE)

Demarcation point

LocalLoop

O Point-of-Presence (POP)

3. Which two devices operate in a similar manner to the voiceband modem but use higher broadband
frequencies and transmission speeds. (Choose two.)

Cable Modem

CSU/DSU

DSL Modem Optical

Converter

Voiceband Modem

4. Which communication method is used in all WAN connections?

Circuit-Switched

Packet-Switched

Parallel

Serial

5. Which two WAN connectivity options are circuit-switched technologies? (Choose two.)

ATM

Ethernet WAN

Frame Relay

ISDN

PSTN
6. Which two WAN connectivity options are packet — switched technologies? (Choose two.)

Ethernet WAN
Frame Relay
ISDN
PSTN

7. Which service provider fiber-optic technology increases the data—carrying capacity using different
wavelengths?

DWDM

SDH

SONET

1. Which traditional WAN connectivity option uses T— Carrier or E—Carrier lines?

ATM
Frame Relay
ISDN

O Leased lines

PSTN

2. Which two traditional WAN connectivity options are circuit—switched? (Choose two.)

ATM

Frame Relay
ISDN
Leased lines
PSTN

3. Which two traditional WAN connectivity options are packet—switched? (Choose two.) ATM
Frame Relay
ISDN
Leased lines
PSTN
1. Which WAN connectivity option is based on Ethernet LAN technology?

ATM

Cable

DSL

O Metro Ethernet MPLS

2. Which is a service provider WAN solution that uses labels to direct the how of packets through the provider
network?

ATM

Cable

DSL

Metro Ethernet

MPLS
1. A companyv is expanding its business to other countries. All branch offices must remain connected to corporate
headquarters at all times. Which network technology is required to support this scenario?

MAN

WAN

WLAN

LAN

2. What is the recommended technology to use over a public WAN infrastructure when a branch office is
connected to the corporate site?

ISDN

VPN

ATM

municipal Wi-Fi

3. Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?

O fiber optic

Wi-Fi

copper

satellite

4. Which statement describes a characteristic of a WAN?

A WAN provides end-user network connectivity to the campus backbone.

O WAN networks are owned bv service providers.

A WAN operates within the same geographic scope of a LAN, but has serial links. All serial

links are considered WAN connections.

5. Which type of network would be used by a company to connect locations across the country?

SAN

WLAN

LAN

WAN
6. A small company with 10 employees uses a single LAN to share information between computers. Which
type of connection to the Internet would be appropriate for this company?

O a broadband service, such as DSL, through their local service provider private

dedicated lines through their local service provider

Virtual Private Networks that would enable the company to connect easily and securely with emplo vees

a dialup connection that is supplied by their local telephone service provider

7. To which two layers of the OSI model do WAN technologies provide services? (Choose two.) transport

laver

data link layer

session layer

presentation layer

network layer

physical layer

8. A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth
between two sites. Which type of WAN connection would best fulfill this need?

Ethernet WAN

circuit-switched network

MPLS

packet-switched network

9. An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses Which two
types of WAN infrastructure would meet the requirements? (Choose two.)

public infrastructure

cellular

private infrastructure

dedicated

circuit-switched
10. An enterprise has four branches. The headquarters needs full connectivity to all branches. The branches do not need
to be connected directly to each other. Which WAN topology is most suitable?

point-to-point

full mesh mesh

bus

O hub and spoke

11. What is a characteristic of a WAN?

WANs always use physical cables to connect LANs.

A WAN operates inside the geographic scope of a LAN.

A WAN is typicaI!v wned bv an enterprise which wants to interconnect its LANs.

O WAN service providers include carriers such as a telephone network or satellite service.

12. What are two common types of circuit-switched WAN technologies? (Choose two.)

ATM

ISDN

Frame Relay

DSL

PSTN

13. A new corporation needs a data network that must meet certain requirements. The network must provide a low cost
connection to sales people dispersed over a large geographical area. Which two types of WAN infrastructure would
meet the requirements? (Choose two.)

dedicated

satellite

Internet

public infrastructure private

infrastructure
1. Which VPN benefit allows an enterprise to easily add more users to the network?

Cost Savings

Security

O Scalability

Compatibility

2. Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding
more equipment or WAN links?

Cost Savings

Security

Scalability

Compatibility

3 Which VPN benefit uses advanced encryption and authentication protocols to protect data from
unauthorized access?

Cost Savings

Security

Scalability

Compatibility

4. Which type of VPN is used to connect a mobile user?

Site-to-site

O Remote-access GRE

IPsec

5 Which VPN solutions are typically managed by an enterprise? (Choose three)

MPLS Layer 2

MPLS Layer 3

IPsec

SSL

Frame Relay DMVPN


1. What type of VPN can be established with a web browser using HTTPS?

IPsec

Client-based VPN

Site-to-Site VPN

O Clientless VPN

2. Which feature describes SSL VPNs?

All IP-based applications are supported O

Only requires a web browser on a host

Specific devices with specific configurations can connect

Uses two-way authentication with shared keys or digital certificates

3. What type of protocol is GRE?

Security protocol

Passenger protocol Carrier

protocol Transport

protocol

4. What type of VPN enables an enterprise to rapidly scale secure access across the organization?

DMVPN

Remote-access VPN

Site-to-Site VPN MPLS

VPN

5. What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?

DMVPN

Remote-access VPN

Site-to-Site VPN MPLS

VPN
1. IPsec can protect traffic in which OSI layers? (Choose four.)

Layer

Layer 2

Layer 3

Layer 4

Layer 5

Layer 6

Layer 7

2. Which IPsec function uses pre—shared passwords, digital certificates, or RSA certificates?

IPsec protocol

Confidentiality

lingerie

O Authentication

Dither—Hell man

3. True or False: The IPsec framework must be updated each time a new standard is developed.

True

O False

4. Which choices are packet encapsulation options suported by IPsec? (Choose two.) AES

AH

DH24

ESP

PSK

RSA

SHA
5. Which choices provide for the Confidentiality function in the IPsec framework? (Choose three.)

3DES

AES

AH

DH24

PSK

SEAL

SHA

6. Which choices provide for the Integrity function in the IPsec framework? (Choose two.)

AES

AH

DH24

MD5

PSK

SEAL

SHA

7. Which choices are available for the Authentication function in the IPsec framework? (Choose two.)

AES

AH

DH24

PSK

RSA

SEAL

SHA

8. Which Diffie—Hellman group choices are no longer recommended?

PDH groups1,2,and 5

DH groups 14, 15,and 16

DH groups 19,20,21 and 24


1. Which two statements describe a remote access VPN? (Choose two.)

It requires hosts to send TCP/IP traffic through a VPN gateway. It

connects entire networks to each other.

It may require VPN client software on hosts.

It is used to connect individual hosts securely to a company network over the Internet. It

requires static configuration of the VPN tunnel.

2. The use of 3DES within the lPsec framework is an example of which of the five lPsec building blocks?

integrity

authentication

Diffie—Hellman

O confidentiality

nonrepudiation

3. Which type of VPN may require the Cisco VPN Client software?

SSL VPN

site—to-site VPN

O remote access VPN

MPLS VPN

4. Which technique is necessary to ensure a private transfer of data using a VPN?

scalability

encryption

virtualization

authorization

5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

client-to-site

spoke—to-spoke

hub—to-spoke

server-to—client

site—to-site
6. What are two reasons a company would use a VPN? (Choose two.)

to allow suppliers to access the

network to connect remote users to

the network to increase bandwidth to

the network

to test network connections to remote

users to eliminate the need of having a

gateway

7. True or False?
All VPNs securely transmit clear text across the Internet.

false

vue

8. Which solution allows workers to telecommute effectively and securely?

O remote—access VPN

DSL connection

dial — up connection

site—to—site VPN

9. Which VPN type is a service provider managed VPN?

site—to—site VPN

remote access VPN

O Layer 3 MPLS VPN

GRE over IPsec VPN

10. Which IPsec framework protocol provides data integrity and data authentication, but does not
provide data confidentiality?

IP protocol 50

AH

ESP

DH
11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?

RSA AES

HMAC

DH

12. Which statement describes the effect of key length in deterring an attacker from hacking through an
encryption key?

The length of a kev does not affect the degree of securityv

The longer the kev, the more key possibilities exist.

The length of a kev will not vary between encryption algorithms. The

shorter the kev, the harder it is to break.

13. What is a type of VPN that is generally transparent to the end user?

public

remote access

site-to-site

private
1. What is the varia ble amount of time it takes for a frame to traverse the links between the source and
destination?

serialization delay

O propagation delay

code delay

2. What happens when congestion occurs?

O packet loss

jitter

code delay

3. What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?

O serialization delay

jitter

code delay

4. What is caused by variation in delay?

congesflon

packet loss

jitter
1. Which type of traffic tends to consume a large portion of network capacity?

voice

video

data

2. Which type of traffic requires at least 384 Kbs of bandwidth?

voice

video

data

3. Which type of traffic is unpredictable, inconsistent, and bursty?

voice

video

data

4. Which type of traffic can be predictable and smooth?

voice

video

data

5. Which type of traffic cannot be retransmitted if lost?

voice

video

data

6. Which type of traffic must receive a higher UDP priority?

voice

video

data
1. Which queuing algorithm simultaneously sc hedules interactive traffic to the front of a queue 1o reduce
response time?

FIFO

WFQ

CBVVFQ

LLQ

2. Which queuing algorithm provides support for user-defined traffic c asses?

FIFO

\n/FQ

CBWFQ

LLQ

3. Which queuing algorithm is effective for large links that have little delay and minimal congestion?

FIFO

WFQ

CBWFQ

LLQ

4. Which queuing algorithm classifies traffic into different flows based on packet header addressing?

FIFO

WFQ

CBVV*O

LLQ

5. Which queuing algorithm allows delay—sensitive data such as voice to be sent before packets in other queues?

FIFO

\n/FQ

CB\n/ >Q

@ LLQ

6. Which queuing algorithm applies priority, or weights, to identify traffic and classify it?

FIFO

WFQ

CBW*Q

LLQ
1. Which QoS model provides per-request policy admission control?

best effort

O integrated services differential


services

2. Which QoS model requires no special QoS mechanisms?

 best effort

 integrated services

differential services

3. Which QoS model provides many different levels of quality?

best effort

integrated services

differential services

4. Which QoS model uses explicit end-to-end resource admission control? best

effort

O integrated services differential


services

5. Which QoS model is the most scalable?

best effort

integrated services

differential services
1. Which detects when traffic rates reach a configured maximum rate and drops excess traffic?

traffic policing

traffic shaping

classification

2. Which determines what c lass of traffic packets or frames belong to.

marking

classification

traffic shaping

3. Which adds a value to the packet header?

O• marking
classification

802.1Q

4. Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted? traffic

policing

802.1Q

O• WRED

5. Which retains excess packets in a queue and then schedules the excess for later transmission over
increments of time?

WRED

traffic policing

O traffic shaping
1. What is the term used to indicate a variation of delay?

latency

speed mismatch

serialization delay

jitter

2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from
a source to a destination device and return. Which term describes the value?

jitter

priority

bandwidth

latency

3. What role do network devices play in the IntServ QoS model?

Network devices use QoS on a hop- bv- hop basis to provide excellent scalabil ‹v Network

devices provide a best-effort approach to forwarding trafhc.

O Network devices ensure that resources are available before traffic is allowed to be sent by a host through the
network.

Network devices are configured to service multiple classes of trafhc and handle trafhc as it may arrive.

4. Which device would be classified as a trusted endpoint? switch

router

O IP phone firewall

5. Under which condition does congestion occur on a converged network with voice, video, and data traffic?

O if the request for bandwidth exceeds the amount of bandwidth available

if a user downloads a file that exceeds the file limitation that is set on the server if

video trafhc requests more bandwidth than voice trafhc requests

if voice traffic latency begins to decrease across the network


6. Which type of traffic does Cisco recommend be placed in the strict priority queue (PC) when low latency queuing
(LLQ) is being used?

voice

video

management

data

7. Which model is the only QoS model with no mechanism to classify packets?

O best-effort

DiffServ

IntServ

hard €}oS

8. What happens when the memory queue of a device fills up and new network traffic is received?

The network device drops all trafhc in the queue. The

network device will drop the arriving packets.

The network device sends the received trafhc immediately.

The network device queues the received traffic while sending previously received traffic.

9. What are two characteristics of voice traffic? (Choose two.) It is

bursty.

It can tolerate latency up to 400 ms.

It is delav sensitive.

It consumes few network resources.

It is insensitive to packet loss.

10. Which QoS model is very resource intensive and provides the highest guarantee of QoS? best-effort

IntServ

DiffServ

soft QoS
11. What happens when an edge router using lntserv QoS determines that the data pathway cannot support the level of
QoS requested?

Data is forwarded along the pathway using IntServ but not provided preferential treatment. Data is

forwarded along the pathway using DiffServ.

O Data is not forwarded along the pathway.

Data is forwarded along the pathway using a best-effort approach.

12. In QoS models, which type of traffic is commonly provided the most preferential treatment over all other
application traffic?

email

lie transfers

web traffic

voice traffic

13. Which queuing mechanism supports user-defined traffic classes?

CBWFQ

FCFS

FIFO

WFQ

14. What mechanism compensates for jitter in an audio stream bv buffering packets and then replaying them outbound
in a steady stream?

WFQ

voice codec

digital signal processor O

playout delay buffer

You might also like