Network + Transcender Questions (Network Architecture)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You connect a home computer to a BRI ISDN line. The Bandwidth On Demand Interoperability Group (BONDING) protocol is used to combine the channels. What is the maximum data transfer rate of the B channels? 56 Kbps 128 Kbps 1.544 Mbps 44.736 Mbps

128 Kbps

What is the highest speed available when implementing DS3? 3 Mbps 10 Mbps 45 Mbps 1 Gbps

45 Mbps

DMZ

A demilitarized zone (DMZ) is an isolated subnet on a corporate network that contains resources that are commonly accessed by public users, such as Internet users. The DM is created to isolate those resources to ensure that other resources that should remain private are not compromised. A DMZ is usually implemented with the use of firewalls.

Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks? network-based IDS anomaly-based IDS behavior-based IDS signature-based IDS

signature based IDS

VPN

A virtual private network (VPN) is a technology that allows users to access private network resources over a public network, such as the Internet. Tunneling techniques are used to protect the internal resources.

Which statement is true of a network-based intrusion detection system (NIDS)? An NIDS generates a finite number of alarms. An NIDS does not analyze real-time information. An NIDS is active while gathering data over the network. An NIDS cannot detect an intruder who is logged on to a host computer.

An NIDS cannot detect an intruder who is logged on to a host computer.

ATM

Asynchromous Transfer Mode - high-speed, cell switching link type transmitting up to 2,488 Mbps. ATM cell 53 bytes:48-byte payload/5-byte header.

You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (Choose all that apply.) A. Configure the DNS server as a server option. B. Configure the DNS server as a scope option for each scope. C. Configure each router as a server option. D. Configure each router as a scope option for its appropriate scope.

Configure the DNS server as a server option. Configure each router as a scope option for its appropriate scope.

You need to ensure that the Web server always receives the same IP address from the DHCP server. What should you do? Create a DHCP scope. Create a DHCP exclusion. Create a DHCP reservation. Create a scope option.

Create a DHCP reservation

Which RADIUS implementation was created to deal with Voice over IP (VoIP) and wireless services? TACACS XTACACS TACACS+ Diameter

Diameter

ESP

Encapsulating Security Protocol (ESP) encrypts IPSec packets. Transport mode sends IPSec packets between two computers without encapsulating packets. AH and ESP work in transport mode and tunnel mode.

FDDI

Fiber Distributed Data Interface - high-speed, Token Ring network that uses fiber optic calbe transmitting up to 100Mbps. Ring Distance=100kilometers(62 miles)

DHCP server

Provide dynamic IP addresses

Which system or device detects network intrusion attempts and controls access to the network for the intruders? firewall IDS IPS VPN

IPS (Intrusion Prevention System)

Which three statements are true of Internet Protocol Security (IPSec)? (Choose three.) A IPSec can work in either in tunnel mode or transport mode. B IPSec uses encapsulation security payload (ESP) and authentication header (AH) as security protocols for encapsulation. C The IPsec framework uses L2TP as the encryption protocol. D The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions. E IPSec ensures availability of information as a part of the CIA triad.

IPSec can work in either in tunnel mode or transport mode. IPSec uses encapsulation security payload (ESP) and authentication header (AH) as security protocols for encapsulation. The IPSec framework is used in a virtual private network (VPN) implementation to secure transmissions.

Your company has a corporate-wide Windows Server 2008 network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflicts. Which action should you perform? Implement a DHCP server. Increase the TCP window size. Manually configure IP addresses on each computer. Change the MAC address for each network interface card.

Implement a DHCP server

Users on your network have access to the Internet. As more users access the Internet, bandwidth starts to diminish, causing Web pages to load slowly. After looking at the Web server logs, you have noticed that many of the same Web sites are being accessed by multiple users. What should you do to improve your company's Internet bandwidth? Implement a DNS server. Implement a WINS server. Implement an IP proxy server. Implement an HTTP proxy server.

Implement an HTTP proxy server.

ICA

Independent Computing Architecture (ICA) is a Citrix protocol used in application server environments.

ISDN

Integrated Services Digital Network - provides direct, point to point digital connection at a speed of up to 2Mbps.

IPSec

Internet Protocol Security (IPSec) in tunnel mode with the Authentication Header (AH) protocol produces an encapsulated packet that is digitally signed. AH digitally signs a packet for authentication purposes. Tunnel mode encapsulates a packet within another packet

ISAKMP

Internet Security Association and Key Management Protocol (ISAKMP) is a protocol that works with IPSec to establish a secure session.

IDS

Intrusion Detection System - detects network intrusion attempts but does not prevent them.

IPS

Intrusion Prevention System - detects network intrusion attempts and controls access to the network.

What is one advantage of the dual-ring topology in a FDDI system? A. It does not require a repeater. B. It is not limited to a maximum ring length. C. It can accommodate 1,000 computers per ring. D. It automatically utilizes the secondary ring if the primary ring fails.

It automatically utilizes the secondary ring if the primary ring fails.

You decide to implement a DHCP server on your network. What is the purpose of a DHCP scope? It is the temporary assignment of an IP address. It is the range of IP addresses that a DHCP server can temporarily assign. It is an IP address that is set aside for a certain device. It is an IP address that cannot be assigned.

It is the range of IP addresses that a DHCP server can temporarily assign.

L2TP

Layer Two Tunneling Protocol (L2TP) is an enhancement of PPTP and can also be used to create a VPN.

proxy server

Manage Internet requests and cache Web content.

DNS Resource Record Type A

Maps a host name to an IPv4 address

DNS Resource Record Type AAAA

Maps a host name to an IPv6 address

DNS Resource Record Type MX

Maps a mail server name to a domain

DSN Resource Record Type PTR

Maps an IP address to a host name

DNS Resource Record Type CNAME

Maps an additional host name to an existing host record

A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy? NAT PAT APIPA DHCP

PAT - Port Address Translation

PPP

PPP is a protocol used to establish dial-up network connections.

Your organization has decided to implement a virtual private network (VPN) to allow remote employees to access internal resources. Which two protocols are used to create VPNs over TCP/IP? (Choose two.) PPP SSL RAS PPTP L2TP

PPTP L2TP

PPPoE

Point-to-Point Protocol over Ethernet (PPPoE) is a protocol that encapsulates PPP within Ethernet frames.

PPTP

Point-to-Point Tunneling Protocol (PPTP) was created by Microsoft to work with the Point-to-Point protocol (PPP) to create a virtual Internet connection so that networks can use the Internet as their WAN link.

Which technology provides centralized remote user authentication, authorization, and accounting? VPN DMZ RADIUS Single sign-on

Radius

RAS

Remote Access Service (RAS) is a service provided by the network operating system that allows remote access to the network via a dial-up connection.

Radius

Remote Authentication Dial-In User Service (RADIUS) provides centralized remote user authentication, authorization, and accounting.

RDP

Remote Desktop Protocol (RDP) is a Microsoft protocol that establishes sessions with other computers.

DSN server

Resolves host names and IP addresses

Your network contains four segments. Which network devices can you use to connect two or more of the LAN segments together? (Choose four.) Hub Router Switch Bridge Repeater Wireless Access Point

Router Switch Bridge WAC

SSL

Secure Sockets Layer (SSL) is a security protocol that uses both encryption and authentication to protect data sent in network communications.

Single Sign-On

Single sign-on is a feature whereby a user logs in once to access all network resources.

Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company's users must be able to connect to the partner's network quickly and reliably. Support for voice, data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible while providing enough bandwidth for your company's employees. What should you implement? T1 ATM FDDI ISDN POTS

T1 - provides fast, digital connections of up to 1.544 Mbps, transmitting voice, data and video.

Which connection type allows for connections of up to 44.736 Mbps? T1 E1 T3 E3

T3

VPN Concentrator

Terminates the VPN tunnels

VPN

Virtual Private Network - is a private network that users can connect to over a public network.

WAC

Wireless Access Point - is essentially a translational bridge.

What is ISAKMP? a Microsoft protocol that establishes sessions with other computers a protocol that encapsulates PPP within Ethernet frames a protocol that works with IPSec to establish a secure session a Citrix protocol used in application server environments

a protocol that works with IPSec to establish a secure session

Which payload is produced by using IPSec in tunnel mode with the AH protocol? an encapsulated packet that is encrypted an encapsulated packet that is digitally signed an unencapsulated packet that is encrypted an unencapsulated packet that is digitally signed

an encapsulated packet that is digitally signed

In PKI, what is the entity that signs a certificate? an issuer a principal a verifier a subjec

an issuer

Your network contains a DHCP server. While performing routine maintenance, you discover that the DHCP server has the following types of options configured: server options, scope options, reserved client options, and class options. Which of these types of options takes precedence? A. server options B. scope options C. class options D. reserved client options

reserved client options

What is the main purpose of a VPN concentrator? to terminate the VPN tunnels to resolve host names and IP addresses to provide dynamic IP addresses to manage Internet requests and cache Web content

to terminate the VPN tunnels


Set pelajaran terkait

Principles of Exercise: Lesson 6

View Set

chap 11 launchpad, chap 11 quiz, chap 12 quiz, chap 12 launchpad, chap 15 launchpad, chap 16 launchpad, chap 17 launchpad, chap 19 launchpad, chap 42 launchpad, chap 16, 15, 17 quiz, chap 19 quiz, chap 30 quiz, chap 30 self assessment, exam 4, exam 4...

View Set

Peds final (ch 1, 3-7, 13-15, 18-21, 23): part 2 (fixed)

View Set

Ch. 28: Pregnancy and Human Development

View Set

Unit 2 Smartbook Assignments and Activities

View Set

Chapter 7: Protective Gear and Sports Equipment

View Set

Completing the Application, Underwriting, and delivering the policy QUIZ

View Set