CCNA3 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which Diffie-Hellman group choices are no longer recommended?

1,2, and 5

Which choices provide for the Confidentiality function in the IPsec framework? (Choose three.) 3DES AES AH DH24 PSK SEAL SHA

3DES AES SEAL

IPsec can protect traffic in which OSI Layers?

4,5,6,7

Which two options describe a WAN? (Choose two.) A WAN is owned and managed by an organization or home user. A WAN provides networking services over large geographical areas. WAN services are provided for a fee. WANs providers offer low bandwidth speeds over short distances. WANs guarantee security between the endpoints.

A WAN provides networking services over large geographical areas. WAN services are provided for a fee.

Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

AH

Which choices are packet encapslation options suported by IPsec? (Choose two.) AES AH DH24 ESP PSK RSA SHA

AH ESP

Which two traditional WAN connectivity options are packet-switched?

ATM Frame Relay

What address translation is performed by static NAT? An inside local address is translated to a specified outside local address. An inside local address is translated to a specified inside global address. An outside local address is translated to a specified outside global address. An inside local address is translated to a specified outside global address.

An inside local address is translated to a specified inside global address.

Why is NAT not needed in IPv6?​ Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​ The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet. The problems that are induced by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers.​ Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks.​

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates?

Authentication

Which queuing algorithm provides support for user-defined traffic classes?

CBWFQ

Which two devices operate in a similar manner to the voiceband modem but use higher broadband frequencies and transmission speeds. (Choose two.) Cable Modem CSU/DSU DSL Modem Optical Converter Voiceband Modem

Cable Modem DSL Modem

What type of protocol is GRE?

Carrier Protocol

What is one advantage of using NAT at the edge of the network? NAT enables end-to-end IPv4 traceability, making troubleshooting easier. Changing ISPs is simpler because the devices on the inside network do not have to be configured with new addresses when the outside address changes. Dynamic NAT allows devices from outside the local network to easily initiate TCP connections to inside hosts. Performance is significantly increased because the router does not have to perform as many route lookups.

Changing ISPs is simpler because the devices on the inside network do not have to be configured with new addresses when the outside address changes.

What type of VPN can be established with a web browser using HTTPS?

Clientless VPN

The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?

Confidentiality

Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding more equipment or WAN links?

Cost Savings

What type of VPN enables an enterprise to rapidly scale secure access across the organization?

DMVPN

Which service provider fiber-optic technology increases the data-carrying capacity using different wavelengths?

DWDM

A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?

Ethernet WAN

Which two WAN connectivity options are packet-switched technologies? (Choose two.) Ethernet WAN Frame Relay ISDN PSTN

Ethernet WAN Frame Relay

Which queuing algorithm is effective for large links that have little delay and minimal congestion?

FIFO

The IPsec framework must be updated each time a new standard is developed.

False

The use of NAT makes end-to-end traceability between source and destination easier.

False

With NAT overload, each inside local IP address is translated to a unique inside global IP address on a one-for-one basis.

False

All VPNs securely transmit clear text across the Internet.

Fasle

What algorithm is used to provide data integrity of a message through the use of a calculated hash value?

HMAC

Which VPN solutions are typically managed by an enterprise? MPLS Layer 2 MPLS Layer 3 IPsec SSL Frame Relay DMVPN

IPsec SSL DMVPN

Which two traditional WAN connectivity options are circuit-switched? (Choose two.)

ISDN PTSN

What are two tasks to perform when configuring static NAT? Define the outside global address. Define the inside global address on the server Create a mapping between the inside local and inside global addresses. Configure a NAT pool. Identify the participating interfaces as inside or outside interfaces.

Identify the participating interfaces as inside or outside interfaces. Create a mapping between the inside local and inside global addresses.

Into what type of address has the IPv4 address for PC1 been translated (i.e., 209.165.200.226)?

Inside Global

What benefit does NAT64 provide? It allows sites to use private IPv4 addresses, and thus hides the internal addressing structure from hosts on public IPv4 networks. It allows sites to connect multiple IPv4 hosts to the Internet via the use of a single public IPv4 address. It allows sites to use private IPv6 addresses and translates them to global IPv6 addresses. It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses.

It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses.

Which two statements about the WAN OSI Layer 1 are true? It describes how data will be encapsulated into a frame. It describes the electrical, mechanical, and operational components needed to transmit bits. It includes protocols such as PPP, HDLC, and Ethernet. It includes protocols such as SDH, SONET, and DWDM.

It includes protocols such as SDH, SONET, and DWDM. It describes the electrical, mechanical, and operational components needed to transmit bits.

Which two statements describe a remote access VPN? (Choose two.) It may require VPN client software on hosts. It is used to connect individual hosts securely to a company network over the Internet. It requires static configuration of the VPN tunnel. It connects entire networks to each other. It requires hosts to send TCP/IP traffic through a VPN gateway.

It is used to connect individual hosts securely to a company network over the Internet. It may require VPN client software on hosts.

Which statement accurately describes dynamic NAT? It always maps a private IP address to a public IP address. It provides an automated mapping of inside local to inside global IP addresses. It provides a mapping of internal host names to IP addresses. It dynamically provides IP addressing to internal hosts.

It provides an automated mapping of inside local to inside global IP addresses.

Which queuing algorithm allows delay-sensitive data such as voice to be sent before packets in other queues?

LLQ

Which VPN type is a service provider managed VPN?

Layer 3 MPLS VPN

Which traditional WAN connectivity option uses T-Carrier or E-Carrier lines?

Leased lines

Which choices provide for the Integrity function in the IPsec framework? (Choose two.) AES AH DH24 MD5 PSK SEAL SHA

MD5 SHA

Which is a service provider WAN solution that uses labels to direct the flow of packets through the provider network?

MPLS

What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?

MPLS VPN

Which WAN connectivity option is based on Ethernet LAN technology?

Metro Ethernet

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? NAT improves packet handling. NAT will impact negatively on switch performance.

NAT provides a solution to slow down the IPv4 address depletion. NAT introduces problems for some applications that require end-to-end connectivity.

Which feature describes SSL VPNs? All IP-based applications are supported Only requires a web browser on a host Specific devices with specific configurations can connect Uses two-way authentication with shared keys or digital certificates

Only requires a web browser on a host

What type of NAT address is the IP address of the Web Server (i.e., 209.165.201.10)?

Outside Global

Which version of NAT allows many hosts inside a private network to simultaneously use a single inside global address for connecting to the Internet? dynamic NAT PAT port forwarding static NAT

PAT

Which two WAN connectivity options are circuit-switched technologies? (Choose two.) ATM Ethernet WAN Frame Relay ISDN PSTN

PSTN ISDN

What are two common types of circuit-switched WAN technologies? PSTN ISDN DSL Frame Relay ATM

PSTN ISDN

Which WAN term defines the point where the subscriber connects to the service providers network. Customer Premises Equipment (CPE) Data Communications Equipment (DCE) Demarcation point Local Loop Point-of-Presence (POP)

Point-of-Presence (POP)

Which choices are available for the Authentication function in the IPsec framework? (Choose two.) AES AH DH24 PSK RSA SEAL SHA

RSA PSK

Which type of VPN is used to connect a mobile user?

Remote-access

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task? Router# debug ip nat translations Router# show ip nat statistics Router# show ip nat translations Router# clear ip nat translations

Router# show ip nat translations

Which VPN benefit allows an enterprise to easily add more users to the network?

Scalability

Which VPN benefit uses advanced encryption and authentication protocols to protect data from unauthorized access?

Security

Which communication method is used in all WAN connections? Circuit-Switched Packet-Switched Parallel Serial

Serial

Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key? The longer the key, the more key possibilities exist. The length of a key does not affect the degree of security. The shorter the key, the harder it is to break. The length of a key will not vary between encryption algorithms.

The longer the key, the more key possibilities exist.

When dynamic NAT without overloading is being used, what happens if seven users attempt to access a public server on the Internet when only six addresses are available in the NAT pool? The request to the server for the seventh user fails. The first user gets disconnected when the seventh user makes the request. All users can access the server. No users can access the server.

The request to the server for the seventh user fails.

What is a disadvantage of NAT? The internal hosts have to use a single public IPv4 address for external communication. There is no end-to-end addressing. The router does not need to alter the checksum of the IPv4 packets.​ The costs of readdressing hosts can be significant for a publicly addressed network.​

There is no end-to-end addressing.

A side effect of NAT is that it hides the inside local IP address of a host from the outside network.

True

Tunneling protocols such as IPsec do not work well through NAT.

True

What is the recommended technology to use over a public WAN infrastructure when a branch office is connected to the corporate site?

VPN

A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario?

WAN

Which type of network would be used by a company to connect locations across the country?

WAN

Which statement describes a characteristic of a WAN? All serial links are considered WAN connections. WAN networks are owned by service providers. A WAN provides end-user network connectivity to the campus backbone. A WAN operates within the same geographic scope of a LAN but has serial links.

WAN networks are owned by service providers.

What is a characteristic of a WAN? A WAN is typically owned by an enterprise which wants to interconnect its LANs.​ WANs always use physical cables to connect LANs. WAN service providers include carriers such as a telephone network or satellite service. A WAN operates inside the geographic scope of a LAN.

WAN service providers include carriers such as a telephone network or satellite service.

Which queuing algorithm applies priority, or weights, to identify traffic and classify it?

WFQ

Which queuing algorithm classifies traffic into different flows based on packet header addressing?

WFQ

Which queuing algorithm simultaneously schedules interactive traffic to the front of a queue to reduce response time?

WFQ

A small company with 10 employees uses a single LAN to share information between computers. Which type of connection to the Internet would be appropriate for this company?

a broadband service, such as DSL, through their local service provider

What is a security feature of using NAT on a network? denies all internal hosts from communicating outside their own network denies all packets that originate from private IP addresses allows internal IP addresses to be concealed from external users allows external IP addresses to be concealed from internal users

allows internal IP addresses to be concealed from external users

Which QoS model requires no special QoS mechanisms?

best effort

Which type of traffic tends to consume a large portion of network capacity?

data

To which two layers of the OSI model do WAN technologies provide services?

data link layer physical layer

Which is a type of WAN carrier connection that provides redundancy?

dual-carrier WAN

A company designs its network so that the PCs in the internal network are assigned IP addresses from DHCP servers, and the packets that are sent to the Internet are translated through a NAT-enabled router. What type of NAT enables the router to populate the translation table from a pool of unique public addresses, as the PCs send packets through the router to the Internet? PAT ARP dynamic NAT static NAT

dynamic NAT

A company has been assigned the 203.0.113.0/27 block of IP addresses by the ISP. The company has over 6000 internal devices. What type of NAT would be most appropriate for the employee workstations of the company? dynamic NAT overload using the pool of addresses PAT off the external router interface dynamic NAT port forwarding static NAT

dynamic NAT overload using the pool of addresses

Which technique is necessary to ensure a private transfer of data using a VPN?

encryption

Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM

fiber-optic

Which type of WAN network design is the most fault-tolerant?

fully-meshed topology

An enterprise has four branches. The headquarters needs full connectivity to all branches. The branches do not need to be connected directly to each other. Which WAN topology is most suitable?

hub and spoke

What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

hub-to-spoke spoke-to-spoke

What type of NAT address is the IP address of PC1 (i.e., 192.168.10.10)?

inside Local

Using NAT terminology, what is the address of the source host on a private network as seen from inside the network? outside global inside global inside local outside local

inside local

Which QoS model provides per-request policy admission control?

integrated services

What is caused by variation in delay?

jitter

Which topology type describes the virtual connection between source to destination?

logical topology

Packet loss

packet loss

What is the variable amount of time it takes for a frame to traverse the links between the source and destination?

propagation delay

An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses. Which two types of WAN infrastructure would meet the requirements? (Choose two.) private infrastructure dedicated public infrastructure circuit-switched cellular

public infrastructure cellular

A new corporation needs a data network that must meet certain requirements. The network must provide a low-cost connection to salespeople dispersed over a large geographical area. Which two types of WAN infrastructure would meet the requirements? dedicated private infrastructure public infrastructure Internet satellite

public infrastructure Internet

Which solution allows workers to telecommute effectively and securely?

remote-access VPN

Which type of VPN may require the Cisco VPN Client software?

remote-access VPN

What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?

serialization delay

What is a type of VPN that is generally transparent to the end user?

site-to-site

What are two reasons a company would use a VPN? (Choose two.) to increase bandwidth to the network to eliminate the need of having a gateway to test network connections to remote users to allow suppliers to access the network to connect remote users to the network

to allow suppliers to access the network to connect remote users to the network

Which type of traffic is unpredictable, inconsistent, and bursty?

video

Which type of traffic requires at least 384 Kbs of bandwidth?

video

Which type of traffic can be predictable and smooth?

voice

Which type of traffic cannot be retransmitted if lost?

voice

Which type of traffic must receive a higher UDP priority?

voice


Ensembles d'études connexes

CHAPTER 1: UNLOCKING ART’S MYSTERY -

View Set

Abdomen Board Exam: Ch. 6 - Spleen

View Set

respuestas antes de un quizz y quizzes !!! ( 91% - 100 % )

View Set

Introduction to Mastering Anatomy and Physiology

View Set