WAN Connections and Remote Access Vocab & Questions (5)
Which of the following is an accurate description of a cable Internet connection? A. A shared access connection capable of speeds up to 50 Mbps B. A dedicated line for a home or business capable of high speeds C. A dedicated line for a home or business that has different upload and download speeds D. A leased line connection for a business offering varying levels of service
A. A shared access connection capable of speeds up to 50 Mbps
You are a network administrator for your company. You have been asked to implement password-based authentication that is supported on Windows and non-Windows clients for your remote access solution. Which of the following password-based authentication protocols should you choose? A. CHAP B. MS-CHAP C. PAP D. MS-CHAPv2
A. CHAP
You are the network administrator for your company and are managing remote access clients. Clients are using smart cards for authentication on the Internal network and you would like to extend that protection to remote access clients. Which authentication protocol is required in order to implement smart card authentication for VPN clients? A. EAP-TLS B. PEAP-TLS C. EAP-MD5 D. None of these
A. EAP-TLS
Which of the following protocols is an industry standard providing centralization of AAA for all remote access clients and wired hosts? A. RADIUS B. VPN C. PSTN D. RAS
A. RADIUS
The capability of remotely connecting to networks for resource sharing and service access is called: A. Remote Access B. POTS C. Connectivity D. Networking
A. Remote Access
____________ is required in this type of connection to convert digital computer signals into analog signals. A. Modulation B. A modem C. Demodultion D. PSTN
B. A modem
Which of the following connectivity methods is often used for small business and homes in order to connect to a public carrier, but could also be used as a backup connection for larger companies providing a dedicated and guaranteed amount of bandwidth? A. Cable B. DSL C. PSTN D. ISDN
B. DSL
You are evaluating VPN protocols for remote access to your Windows Server 2008 network infrastructure. Which of the following VPN protocols provides the easiest administration of firewalls? A. PPTP B. SSTP C. L2TP D. PPP
B. SSTP
In order to connect an organization to the public carrier for either frame relay or T1 connections, which of the following components is used? A. Punchdown block B. Patch panel C. CSU/DSU D. Router
C. CSU/DSU
You are concerned about the level of security for passwords that are passed between remote clients and your VPN server running Windows Server 2012 R2. All remote clients are running Windows 7 or later Microsoft operating systems. You want to ensure the highest level of security is used for the passwords in transit over the network. Which of the following authentication protocols should you choose? A. PAP B. EAP-TLS C. EAP-MD5 D. MS-CHAPv2
C. EAP-MD5
Which of the following best describes a wide area network? A. Multiple classrooms in a single building B. Multiple subnets in a main office location C. Multiple local area networks connected via shared or leased lines D. Multiple wireless hotspots connected together using LAN infrastructures
C. Multiple local area networks connected via shared or leased lines
Which of the following VPN protocols provides the most compatibility for third party operating systems and remote access clients? A. SSTP B. IKEv2 C. PPTP D. L2TP
C. PPTP
Which of the following wireless options is useful for providing high speed access in remote areas where other options would not be possible? A. Wi-Fi B. ADSL C. Satellite D. 4G LTE
C. Satellite
Which of the following T-connections will use leased lines and circuit-switched connections to provide 44.7 Mbps? A. T1 B. T2 C. T3 D. T4
C. T3
Virtual Private Networks (VPN)
the most common type of remote node connection available today; a point-to-point connection that is made over a public network such as the Interent, but which emulates a private link
Which of the following WAN transmission methods provides a type of cell-switching network using fixed length cells and provides very high-speed WAN bandwidth? A. Frame relay B. T1 C. X.25 D. ATM
D. ATM
Which of the following technologies would provide the fastest network connection for remote offices and the Internet? A. Cable B. DSL C. T3 D. OC-12
D. OC-12
Point-to-Point Tunneling Protocol (PPTP)
the most highly compatible protocol that has been used for VPNs since the introduction of this technology
A WAN is a grouping of sites belonging to a single organization. True False
True
Extensible Authentication Protocol (EAP)
a PPP extensiib that includes multiple authentication methods
Digital Subscriber Line (DSL)
a fast data transmission technology that uses ordinary copper telephone lines to simultaneously carry voice and data
Tunnel
a logical path across the network, somewhat like a virtual circuit in some of our wide area network technologies
Wide Area Network (WAN)
a network that spans larger geographical distances and connects mulitple local area networks (LANs) together using high-speed communication lines
Frame Relay
a packet-switching network which is designed for long-distance communications
CSU/DSU
a single module, similar to a PCI card, in a router that handles the WAN/LAN conversion
Accounting
a stage involving the tracking of user activities and actions that can include the lenght of connection time, access types, data transfer, etc
Authentication
the process of validating the identity of an individual to the system
IP address
used a the ultimate source and destination
Wireless Local Loop
also known as fixed-point wireless; a term for the use of wireless communications between the Telco provider and the customer
MAC Addresses
always used as the next hop identifier as packets make their way throughout the network
Synchronous Optical Network (SONET)
and ANSI standard protocol for signal transmission on optical networks and is used in the US and Canada
You are the network administrator for your company. Several users work remotely, so you have configured their accounts to use a VPN connection using SSTP. To enhance the security of the network, the VPN server will be placed in the perimeter network. The firewall administrator would like to know which port to leave open on the external firewall to accommodate this. What port number should he ensure is open? A. 80 B. 443 C. 25 D. 3389
b. 443
Cable Modem Communication
uses existing cable television lines to provide data services
Challenge-Handshake Authtentication Protocol (CHAP)
uses three-way handshake mechanism after establishing a link between teh client and the server
Modulation
connection that converts digitial computer signals into analog signals
Integrated Services Digital Network (ISDN)
connectivity option that utilizes phone lines; a very early implementation of DSL that was developed in the late 1980s
Terminal Access Controller Access Controlled System (TACAS+)
developed by Cisco Systems to provide centralized and scalable AAA functions
Global System for Mobile (GSM)
dominate nearly 90 percent of the market share in over 200 countries
Remote Desktop Protocol (RDP)
most common remote control protocol; available for use in the Windows operating system on the business versions of the OS, but is not enabled by default
Routers
operate at layer 3 and will use IP addresses and routing tables in order to determine the best path that a packet should take
Public Switched Telephone Network (PSTN)
otherwise known as POTs, which stands for Plain Old Telephone Service; a very low cost option for connecting homes and small businesses to the Internet and potentially to one another
Permanent Virtual Circuits (PVCs)
provide a permanent virtual connection for communication between remote sites
Coars Wavelength Division Multiplexing (CWDM)
represents devices that do not use the EDFAs; used in more metropolitan types of application and cable television signaling
Remote Node
speaks to connecting a remote client to a corporate network through dial-up or VPN technologies and assigning a usuable IP address to that remote client
Remote Control
the ability to connect to a remote client trhough software known as terminal emulation software