WAN Connections and Remote Access Vocab & Questions (5)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an accurate description of a cable Internet connection? A. A shared access connection capable of speeds up to 50 Mbps B. A dedicated line for a home or business capable of high speeds C. A dedicated line for a home or business that has different upload and download speeds D. A leased line connection for a business offering varying levels of service

A. A shared access connection capable of speeds up to 50 Mbps

You are a network administrator for your company. You have been asked to implement password-based authentication that is supported on Windows and non-Windows clients for your remote access solution. Which of the following password-based authentication protocols should you choose? A. CHAP B. MS-CHAP C. PAP D. MS-CHAPv2

A. CHAP

You are the network administrator for your company and are managing remote access clients. Clients are using smart cards for authentication on the Internal network and you would like to extend that protection to remote access clients. Which authentication protocol is required in order to implement smart card authentication for VPN clients? A. EAP-TLS B. PEAP-TLS C. EAP-MD5 D. None of these

A. EAP-TLS

Which of the following protocols is an industry standard providing centralization of AAA for all remote access clients and wired hosts? A. RADIUS B. VPN C. PSTN D. RAS

A. RADIUS

The capability of remotely connecting to networks for resource sharing and service access is called: A. Remote Access B. POTS C. Connectivity D. Networking

A. Remote Access

____________ is required in this type of connection to convert digital computer signals into analog signals. A. Modulation B. A modem C. Demodultion D. PSTN

B. A modem

Which of the following connectivity methods is often used for small business and homes in order to connect to a public carrier, but could also be used as a backup connection for larger companies providing a dedicated and guaranteed amount of bandwidth? A. Cable B. DSL C. PSTN D. ISDN

B. DSL

You are evaluating VPN protocols for remote access to your Windows Server 2008 network infrastructure. Which of the following VPN protocols provides the easiest administration of firewalls? A. PPTP B. SSTP C. L2TP D. PPP

B. SSTP

In order to connect an organization to the public carrier for either frame relay or T1 connections, which of the following components is used? A. Punchdown block B. Patch panel C. CSU/DSU D. Router

C. CSU/DSU

You are concerned about the level of security for passwords that are passed between remote clients and your VPN server running Windows Server 2012 R2. All remote clients are running Windows 7 or later Microsoft operating systems. You want to ensure the highest level of security is used for the passwords in transit over the network. Which of the following authentication protocols should you choose? A. PAP B. EAP-TLS C. EAP-MD5 D. MS-CHAPv2

C. EAP-MD5

Which of the following best describes a wide area network? A. Multiple classrooms in a single building B. Multiple subnets in a main office location C. Multiple local area networks connected via shared or leased lines D. Multiple wireless hotspots connected together using LAN infrastructures

C. Multiple local area networks connected via shared or leased lines

Which of the following VPN protocols provides the most compatibility for third party operating systems and remote access clients? A. SSTP B. IKEv2 C. PPTP D. L2TP

C. PPTP

Which of the following wireless options is useful for providing high speed access in remote areas where other options would not be possible? A. Wi-Fi B. ADSL C. Satellite D. 4G LTE

C. Satellite

Which of the following T-connections will use leased lines and circuit-switched connections to provide 44.7 Mbps? A. T1 B. T2 C. T3 D. T4

C. T3

Virtual Private Networks (VPN)

the most common type of remote node connection available today; a point-to-point connection that is made over a public network such as the Interent, but which emulates a private link

Which of the following WAN transmission methods provides a type of cell-switching network using fixed length cells and provides very high-speed WAN bandwidth? A. Frame relay B. T1 C. X.25 D. ATM

D. ATM

Which of the following technologies would provide the fastest network connection for remote offices and the Internet? A. Cable B. DSL C. T3 D. OC-12

D. OC-12

Point-to-Point Tunneling Protocol (PPTP)

the most highly compatible protocol that has been used for VPNs since the introduction of this technology

A WAN is a grouping of sites belonging to a single organization. True False

True

Extensible Authentication Protocol (EAP)

a PPP extensiib that includes multiple authentication methods

Digital Subscriber Line (DSL)

a fast data transmission technology that uses ordinary copper telephone lines to simultaneously carry voice and data

Tunnel

a logical path across the network, somewhat like a virtual circuit in some of our wide area network technologies

Wide Area Network (WAN)

a network that spans larger geographical distances and connects mulitple local area networks (LANs) together using high-speed communication lines

Frame Relay

a packet-switching network which is designed for long-distance communications

CSU/DSU

a single module, similar to a PCI card, in a router that handles the WAN/LAN conversion

Accounting

a stage involving the tracking of user activities and actions that can include the lenght of connection time, access types, data transfer, etc

Authentication

the process of validating the identity of an individual to the system

IP address

used a the ultimate source and destination

Wireless Local Loop

also known as fixed-point wireless; a term for the use of wireless communications between the Telco provider and the customer

MAC Addresses

always used as the next hop identifier as packets make their way throughout the network

Synchronous Optical Network (SONET)

and ANSI standard protocol for signal transmission on optical networks and is used in the US and Canada

You are the network administrator for your company. Several users work remotely, so you have configured their accounts to use a VPN connection using SSTP. To enhance the security of the network, the VPN server will be placed in the perimeter network. The firewall administrator would like to know which port to leave open on the external firewall to accommodate this. What port number should he ensure is open? A. 80 B. 443 C. 25 D. 3389

b. 443

Cable Modem Communication

uses existing cable television lines to provide data services

Challenge-Handshake Authtentication Protocol (CHAP)

uses three-way handshake mechanism after establishing a link between teh client and the server

Modulation

connection that converts digitial computer signals into analog signals

Integrated Services Digital Network (ISDN)

connectivity option that utilizes phone lines; a very early implementation of DSL that was developed in the late 1980s

Terminal Access Controller Access Controlled System (TACAS+)

developed by Cisco Systems to provide centralized and scalable AAA functions

Global System for Mobile (GSM)

dominate nearly 90 percent of the market share in over 200 countries

Remote Desktop Protocol (RDP)

most common remote control protocol; available for use in the Windows operating system on the business versions of the OS, but is not enabled by default

Routers

operate at layer 3 and will use IP addresses and routing tables in order to determine the best path that a packet should take

Public Switched Telephone Network (PSTN)

otherwise known as POTs, which stands for Plain Old Telephone Service; a very low cost option for connecting homes and small businesses to the Internet and potentially to one another

Permanent Virtual Circuits (PVCs)

provide a permanent virtual connection for communication between remote sites

Coars Wavelength Division Multiplexing (CWDM)

represents devices that do not use the EDFAs; used in more metropolitan types of application and cable television signaling

Remote Node

speaks to connecting a remote client to a corporate network through dial-up or VPN technologies and assigning a usuable IP address to that remote client

Remote Control

the ability to connect to a remote client trhough software known as terminal emulation software


Set pelajaran terkait

Audit Ch 12 - Inventories & COGS

View Set

Ch. 1 The Accountant's Role in the Organization

View Set

Finance Chapter 13 Buying a Home

View Set

Econ Week 10 Gov. Budgets and Fiscal Policy

View Set

Unit six: oxygenation/perfusion (shock)

View Set

OSHA 30 Construction Test Answer Key FALL HAZARDS ClickSafety Redvector - Flash Cards

View Set