Cuestionario 2 Sulucion
Cuestionario 2 Sulucion
Cuestionario 2 Sulucion
2. Which topology type describes the virtual connection between source to destination?
cabling topology
physical topology
O logical topology
wired topology
dual—homed topology
hub—and—spoke topology
point—to—point topology
It describes the electrical, mechanical, and operational components needed to transmit bits. It
2. Which WAN term demes the point where the subscriber connects to the service providers network.
Demarcation point
LocalLoop
O Point-of-Presence (POP)
3. Which two devices operate in a similar manner to the voiceband modem but use higher broadband
frequencies and transmission speeds. (Choose two.)
Cable Modem
CSU/DSU
Converter
Voiceband Modem
Circuit-Switched
Packet-Switched
Parallel
Serial
5. Which two WAN connectivity options are circuit-switched technologies? (Choose two.)
ATM
Ethernet WAN
Frame Relay
ISDN
PSTN
6. Which two WAN connectivity options are packet — switched technologies? (Choose two.)
Ethernet WAN
Frame Relay
ISDN
PSTN
7. Which service provider fiber-optic technology increases the data—carrying capacity using different
wavelengths?
DWDM
SDH
SONET
ATM
Frame Relay
ISDN
O Leased lines
PSTN
2. Which two traditional WAN connectivity options are circuit—switched? (Choose two.)
ATM
Frame Relay
ISDN
Leased lines
PSTN
3. Which two traditional WAN connectivity options are packet—switched? (Choose two.) ATM
Frame Relay
ISDN
Leased lines
PSTN
1. Which WAN connectivity option is based on Ethernet LAN technology?
ATM
Cable
DSL
2. Which is a service provider WAN solution that uses labels to direct the how of packets through the provider
network?
ATM
Cable
DSL
Metro Ethernet
MPLS
1. A companyv is expanding its business to other countries. All branch offices must remain connected to corporate
headquarters at all times. Which network technology is required to support this scenario?
MAN
WAN
WLAN
LAN
2. What is the recommended technology to use over a public WAN infrastructure when a branch office is
connected to the corporate site?
ISDN
VPN
ATM
municipal Wi-Fi
3. Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?
O fiber optic
Wi-Fi
copper
satellite
A WAN operates within the same geographic scope of a LAN, but has serial links. All serial
5. Which type of network would be used by a company to connect locations across the country?
SAN
WLAN
LAN
WAN
6. A small company with 10 employees uses a single LAN to share information between computers. Which
type of connection to the Internet would be appropriate for this company?
O a broadband service, such as DSL, through their local service provider private
Virtual Private Networks that would enable the company to connect easily and securely with emplo vees
7. To which two layers of the OSI model do WAN technologies provide services? (Choose two.) transport
laver
session layer
presentation layer
network layer
physical layer
8. A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth
between two sites. Which type of WAN connection would best fulfill this need?
Ethernet WAN
circuit-switched network
MPLS
packet-switched network
9. An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses Which two
types of WAN infrastructure would meet the requirements? (Choose two.)
public infrastructure
cellular
private infrastructure
dedicated
circuit-switched
10. An enterprise has four branches. The headquarters needs full connectivity to all branches. The branches do not need
to be connected directly to each other. Which WAN topology is most suitable?
point-to-point
bus
O WAN service providers include carriers such as a telephone network or satellite service.
12. What are two common types of circuit-switched WAN technologies? (Choose two.)
ATM
ISDN
Frame Relay
DSL
PSTN
13. A new corporation needs a data network that must meet certain requirements. The network must provide a low cost
connection to sales people dispersed over a large geographical area. Which two types of WAN infrastructure would
meet the requirements? (Choose two.)
dedicated
satellite
Internet
infrastructure
1. Which VPN benefit allows an enterprise to easily add more users to the network?
Cost Savings
Security
O Scalability
Compatibility
2. Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding
more equipment or WAN links?
Cost Savings
Security
Scalability
Compatibility
3 Which VPN benefit uses advanced encryption and authentication protocols to protect data from
unauthorized access?
Cost Savings
Security
Scalability
Compatibility
Site-to-site
O Remote-access GRE
IPsec
MPLS Layer 2
MPLS Layer 3
IPsec
SSL
IPsec
Client-based VPN
Site-to-Site VPN
O Clientless VPN
Security protocol
protocol Transport
protocol
4. What type of VPN enables an enterprise to rapidly scale secure access across the organization?
DMVPN
Remote-access VPN
VPN
5. What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?
DMVPN
Remote-access VPN
VPN
1. IPsec can protect traffic in which OSI layers? (Choose four.)
Layer
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
2. Which IPsec function uses pre—shared passwords, digital certificates, or RSA certificates?
IPsec protocol
Confidentiality
lingerie
O Authentication
Dither—Hell man
3. True or False: The IPsec framework must be updated each time a new standard is developed.
True
O False
4. Which choices are packet encapsulation options suported by IPsec? (Choose two.) AES
AH
DH24
ESP
PSK
RSA
SHA
5. Which choices provide for the Confidentiality function in the IPsec framework? (Choose three.)
3DES
AES
AH
DH24
PSK
SEAL
SHA
6. Which choices provide for the Integrity function in the IPsec framework? (Choose two.)
AES
AH
DH24
MD5
PSK
SEAL
SHA
7. Which choices are available for the Authentication function in the IPsec framework? (Choose two.)
AES
AH
DH24
PSK
RSA
SEAL
SHA
PDH groups1,2,and 5
It is used to connect individual hosts securely to a company network over the Internet. It
2. The use of 3DES within the lPsec framework is an example of which of the five lPsec building blocks?
integrity
authentication
Diffie—Hellman
O confidentiality
nonrepudiation
3. Which type of VPN may require the Cisco VPN Client software?
SSL VPN
site—to-site VPN
MPLS VPN
scalability
encryption
virtualization
authorization
5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)
client-to-site
spoke—to-spoke
hub—to-spoke
server-to—client
site—to-site
6. What are two reasons a company would use a VPN? (Choose two.)
the network
gateway
7. True or False?
All VPNs securely transmit clear text across the Internet.
false
vue
O remote—access VPN
DSL connection
dial — up connection
site—to—site VPN
site—to—site VPN
10. Which IPsec framework protocol provides data integrity and data authentication, but does not
provide data confidentiality?
IP protocol 50
AH
ESP
DH
11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?
RSA AES
HMAC
DH
12. Which statement describes the effect of key length in deterring an attacker from hacking through an
encryption key?
The length of a kev will not vary between encryption algorithms. The
13. What is a type of VPN that is generally transparent to the end user?
public
remote access
site-to-site
private
1. What is the varia ble amount of time it takes for a frame to traverse the links between the source and
destination?
serialization delay
O propagation delay
code delay
O packet loss
jitter
code delay
3. What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?
O serialization delay
jitter
code delay
congesflon
packet loss
jitter
1. Which type of traffic tends to consume a large portion of network capacity?
voice
video
data
voice
video
data
voice
video
data
voice
video
data
voice
video
data
voice
video
data
1. Which queuing algorithm simultaneously sc hedules interactive traffic to the front of a queue 1o reduce
response time?
FIFO
WFQ
CBVVFQ
LLQ
FIFO
\n/FQ
CBWFQ
LLQ
3. Which queuing algorithm is effective for large links that have little delay and minimal congestion?
FIFO
WFQ
CBWFQ
LLQ
4. Which queuing algorithm classifies traffic into different flows based on packet header addressing?
FIFO
WFQ
CBVV*O
LLQ
5. Which queuing algorithm allows delay—sensitive data such as voice to be sent before packets in other queues?
FIFO
\n/FQ
CB\n/ >Q
@ LLQ
6. Which queuing algorithm applies priority, or weights, to identify traffic and classify it?
FIFO
WFQ
CBW*Q
LLQ
1. Which QoS model provides per-request policy admission control?
best effort
best effort
integrated services
differential services
best effort
integrated services
differential services
4. Which QoS model uses explicit end-to-end resource admission control? best
effort
best effort
integrated services
differential services
1. Which detects when traffic rates reach a configured maximum rate and drops excess traffic?
traffic policing
traffic shaping
classification
marking
classification
traffic shaping
O• marking
classification
802.1Q
4. Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted? traffic
policing
802.1Q
O• WRED
5. Which retains excess packets in a queue and then schedules the excess for later transmission over
increments of time?
WRED
traffic policing
O traffic shaping
1. What is the term used to indicate a variation of delay?
latency
speed mismatch
serialization delay
jitter
2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from
a source to a destination device and return. Which term describes the value?
jitter
priority
bandwidth
latency
Network devices use QoS on a hop- bv- hop basis to provide excellent scalabil ‹v Network
O Network devices ensure that resources are available before traffic is allowed to be sent by a host through the
network.
Network devices are configured to service multiple classes of trafhc and handle trafhc as it may arrive.
router
O IP phone firewall
5. Under which condition does congestion occur on a converged network with voice, video, and data traffic?
if a user downloads a file that exceeds the file limitation that is set on the server if
voice
video
management
data
7. Which model is the only QoS model with no mechanism to classify packets?
O best-effort
DiffServ
IntServ
hard €}oS
8. What happens when the memory queue of a device fills up and new network traffic is received?
The network device queues the received traffic while sending previously received traffic.
bursty.
It is delav sensitive.
10. Which QoS model is very resource intensive and provides the highest guarantee of QoS? best-effort
IntServ
DiffServ
soft QoS
11. What happens when an edge router using lntserv QoS determines that the data pathway cannot support the level of
QoS requested?
Data is forwarded along the pathway using IntServ but not provided preferential treatment. Data is
12. In QoS models, which type of traffic is commonly provided the most preferential treatment over all other
application traffic?
lie transfers
web traffic
voice traffic
CBWFQ
FCFS
FIFO
WFQ
14. What mechanism compensates for jitter in an audio stream bv buffering packets and then replaying them outbound
in a steady stream?
WFQ
voice codec