Networking Module 6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

LLQ

A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice? LLQ CBWFQ WFQ FIFO

latency

A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? jitter latency priority bandwidth

New headers from one or more VPN protocols encapsulate the original packets.

How is "tunneling" accomplished in a VPN? New headers from one or more VPN protocols encapsulate the original packets. All packets between two hosts are assigned to a single physical medium to ensure that the packets are kept private. Packets are disguised to look like other types of traffic so that they will be ignored by potential attackers. A dedicated circuit is established between the source and destination devices for the duration of the connection.

jitter

Voice packets are being received in a continuous stream by an IP phone, but because of network congestion the delay between each packet varies and is causing broken conversations. What term describes the cause of this condition? buffering latency queuing jitter

AES

What algorithm is used with IPsec to provide data confidentiality? Diffie-Hellman SHA MD5 AES

Drop lower-priority packets, Increase link capacity

What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.) Disable queuing mechanisms. Drop lower-priority packets. Prevent bursts of traffic. Increase link capacity.

It does not provide a delivery guarantee for packets. It treats all network packets in the same way.

What are two characteristics of the best-effort QoS model? (Choose two.) It allows end hosts to signal their QoS needs to the network. It uses a connection-oriented approach with QoS. It provides preferential treatment for voice packets. It does not provide a delivery guarantee for packets. It treats all network packets in the same way.

Voice traffic latency should not exceed 150 ms, Dropped voice packets are not retransmitted.

What are two characteristics of voice traffic? (Choose two.) Voice traffic latency should not exceed 150 ms. Voice traffic is unpredictable and inconsistent. Voice traffic requires at least 384 kbs of bandwidth. Voice traffic consumes lots of network resources. Dropped voice packets are not retransmitted.

SHA, MD5

What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.) SHA RSA MD5 AES

Layer 3 marking can carry the QoS information end-to-end.

What is the benefit of deploying Layer 3 QoS marking across an enterprise network? Layer 3 marking can carry the QoS information end-to-end. Layer 3 marking can carry QoS information on switches that are not IP aware. Layer 3 marking can be carried in the 802.1Q fields. Layer 3 marking can be used to carry non-IP traffic.

A trust boundary identifies which devices trust the marking on packets that enter a network.

What is the function of a QoS trust boundary? A trust boundary identifies the location where traffic cannot be remarked. A trust boundary only allows traffic to enter if it has previously been marked. A trust boundary identifies which devices trust the marking on packets that enter a network. A trust boundary only allows traffic from trusted endpoints to enter the network.

allows peers to exchange shared keys

What is the function of the Diffie-Hellman algorithm within the IPsec framework? guarantees message integrity allows peers to exchange shared keys provides authentication provides strong data encryption

guarantees message integrity

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? protects IPsec keys during session negotiation authenticates the IPsec peers creates a secure channel for key negotiation guarantees message integrity

jitter

What is the term used to indicate a variation of delay? latency serialization delay speed mismatch jitter

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

What role do network devices play in the IntServ QoS model? Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network. Network devices provide a best-effort approach to forwarding traffic. Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive. Network devices use QoS on a hop-by-hop basis to provide excellent scalability.

SHA, AES

What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.) SHA RSA AES PSK

voice

What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects? voice video data

data

What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical? voice data video

data

What type of traffic is described as consisting of traffic that requires a higher priority if interactive? data voice video

video

What type of traffic is described as having a high volume of data per packet? video voice data

video

What type of traffic is described as not resilient to loss? video data voice

voice

What type of traffic is described as predictable and smooth? data video voice

voice

What type of traffic is described as requiring latency to be no more than 150 milliseconds (ms)? voice video data

video

What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)? voice data video

Video

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty? Audio Video Data Voice

voice

What type of traffic is described as traffic that requires at least 30 Kbps of bandwidth? voice data video

delay, jitter

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.) delay packet addressing jitter packet routing link speed

integrity

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit? integrity authentication confidentiality secure key exchange

clientless SSL

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA? client-based SSL site-to-site using an ACL clientless SSL site-to-site using a preshared key

IP phone

Which device would be classified as a trusted endpoint? switch router firewall IP phone

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Which is a requirement of a site-to-site VPN? It requires hosts to use VPN client software to encapsulate traffic. It requires the placement of a VPN server at the edge of the company network. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. It requires a client/server architecture.

GRE

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? IKE IPsec OSPF GRE

FIFO

Which queuing algorithm has only a single queue and treats all packets equally? CBWFQ FIFO LLQ WFQ

VPNs use virtual connections to create a private network through a public network.

Which statement describes a VPN? VPNs use open source virtualization software to create the tunnel through the Internet. VPNs use logical connections to create public networks through the Internet. VPNs use dedicated physical connections to transfer data between remote users. VPNs use virtual connections to create a private network through a public network.

It must be statically set up.

Which statement describes an important characteristic of a site-to-site VPN? It must be statically set up. It is ideally suited for use by mobile workers. It requires using a VPN client on the host PC. After the initial connection is established, it can dynamically change connection information. It is commonly implemented over dialup and cable modem networks.

ISR router, another ASA

Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.) DSL switch ISR router another ASA Frame Relay switch

router, another ASA

Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.) DSL switch router another ASA Frame Relay switch

remote access VPN, site-to-site VPN

Which two technologies provide enterprise-managed VPN solutions? (Choose two.) remote access VPN Frame Relay Layer 2 MPLS VPN site-to-site VPN

clientless SSL VPN, client-based IPsec VPN

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.) clientless SSL VPN client-based IPsec VPN IPsec VPN IPsec Virtual Tunnel Interface VPN

GRE over IPsec

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN? dynamic multipoint VPN SSL VPN IPsec virtual tunnel interface GRE over IPsec

SSL VPN

Which type of VPN connects using the Transport Layer Security (TLS) feature? SSL VPN MPLS VPN IPsec virtual tunnel interface dynamic multipoint VPN

MPLS VPN

Which type of VPN has both Layer 2 and Layer 3 implementations? IPsec virtual tunnel interface dynamic multipoint VPN GRE over IPsec MPLS VPN

GRE over IPsec

Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec? dynamic multipoint VPN SSL VPN IPsec virtual tunnel interface GRE over IPsec

GRE over IPsec

Which type of VPN involves passenger, carrier, and transport protocols? GRE over IPsec dynamic multipoint VPN MPLS VPN IPsec virtual tunnel interface

IPsec virtual tunnel interface

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding? MPLS VPN IPsec virtual tunnel interface dynamic multipoint VPN GRE over IPsec

IPsec virtual tunnel interface

Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces? dynamic multipoint VPN IPsec virtual tunnel interface MPLS VPN GRE over IPsec

SSL VPN

Which type of VPN uses the public key infrastructure and digital certificates?​ SSL VPN GRE over IPsec IPsec virtual tunnel interface dynamic multipoint VPN

UDP

Which type of network traffic cannot be managed using congestion avoidance tools? TCP ICMP IP UDP

Voice and video communications are more sensitive to latency.

Why is QoS an important issue in a converged network that combines voice, video, and data communications? Data communications are sensitive to jitter. Legacy equipment is unable to transmit voice and video without QoS.Correct Response Voice and video communications are more sensitive to latency. Data communications must be given the first priority.


Ensembles d'études connexes

Chapter 9: Long-Run Economic Growth

View Set

JCM 103 Final Exam (Quiz Questions)

View Set

Nursing Lifespan of Older Adults

View Set

Art History: Chapter 1 Practice Quiz

View Set

Chapter 10: Therapeutic Response to Clients with Life-Altering Illness

View Set