| Which two statements about DSL are true? (Choose two.) | |
| users are on a shared medium | |
| uses RF signal transmission | |
| local loop can be up to 3.5 miles (5.5km) | |
| physical and data link layers are defined by DOCSIS | |
| user connections are aggregated at a DSLAM located at the CO | |
| Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.) | |
| channel widths | |
| access method | |
| maximum data rate | |
| modulation techniques | |
| compression techniques | |
| Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.) | |
| use higher RF frequencies | |
| allocate an additional channel | |
| subdivide the network to reduce users on each segment | |
| reduce the length of the local loop to 5.5 kilometers or less | |
| use filters and splitters at the customer site to separate voice from data traffic | |
| A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used? | |
| cable | |
| DSL | |
| ISDN | |
| POTS | |
| After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution? | |
| A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text. | |
| The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software. | |
| Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment. | |
| Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS. | |
| What are the three main functions of a secure VPN? (Choose three.) | |
| accounting | |
| authentication | |
| authorization | |
| data availability | |
| data confidentiality | |
| data integrity | |
| Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.) | |
| digital certificates | |
| ESP | |
| hashing algorithms | |
| smart cards | |
| WPA | |
| Data confidentiality through a VPN is achieved through which two methods? (Choose two.) | |
| digital certificates | |
| encryption | |
| encapsulation | |
| hashing | |
| passwords | |
| Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.) | |
| AES | |
| DES | |
| AH | |
| hash | |
| MPLS | |
| RSA | |
| Which is an example of symmetric-key encryption? | |
| Diffie-Hellman | |
| digital certificate | |
| pre-shared key | |
| RSA signature | |
| Which statement describes cable? | |
| Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range. | |
| The cable subscriber must purchase a cable modem termination system (CMTS) | |
| Each cable subscriber has dedicated upstream and downstream bandwidth. | |
| Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path. | |
| A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker's site? | |
| a WiMAX tower | |
| a one-way multicast satellite | |
| a WiMAX receiver | |
| an access point connected to the company WLAN | |
| Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.) | |
| supports municipal wireless networks utilizing mesh technologies | |
| covers areas as large as 7,500 square kilometers | |
| supports point-to-point links, but not full mobile cellular-type access | |
| connects directly to the Internet through high-bandwidth connections | |
| operates at lower speeds than Wi-Fi, but supports many more users | |
| While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician? | |
| Data is being transmitted from the subscriber to the headend. | |
| Data is flowing downstream. | |
| Cable television transmissions are interfering with voice and data transmissions. | |
| The system is experiencing congestion in the lower frequency ranges. | |
|
| |
| Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network. | |
| Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network. | |
| Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network. | |
| All locations can support VPN connectivity. | |
| What two protocols provide data authentication and integrity for IPsec? (Choose two.) | |
| AH | |
| L2TP | |
| ESP | |
| GRE | |
| PPTP | |
| Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.) | |
| ATM | |
| CHAP | |
| IPsec | |
| IPX | |
| MPLS | |
| PPTP | |
|
| |
| a GRE tunnel | |
| a site-to-site VPN | |
| a remote-access VPN | |
| the user must be at the office location to establish a secure connection | |
|
| |
| The devices must use a dedicated Layer 2 connection. | |
| The devices must have the VPN client software installed. | |
| The two parties must inspect the traffic against the same ACLs. | |
| The two parties must establish a secret key used by encryption and hash algorithms. | |
| The two parties must agree on the encryption algorithm to be used over the VPN tunnel. | |
| The devices must be authenticated before the communication path is considered secure. | |
