CCNA 3 v7 Modules 6 - 8: WAN Concepts Exam

Ace your homework & exams now with Quizwiz!

Frame Relay

A company has a headquarters and four remote locations. The headquarters site will require more bandwidth than the four remote sites.

DSL

A company requires higher download speeds than upload speeds and wants to use existing phone lines

T1

A company would like a guaranteed bandwidth using a point-to-point link that requires minimal expertise to install and maintain.

MetroE

A multisite college wants to connect using Ethernet technology between the sites.

cable

A teleworker would like to bundle the internet connection with the other phone and tv services.

hat algorithm is used with IPsec to provide data confidentiality?

AES

Which situation describes data transmissions over a WAN connection?

An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.

3. What are two tasks to perform when configuring static NAT? (Choose two.)

Create a mapping between the inside local and outside local addresses. Identify the participating interfaces as inside or outside interfaces.

Which network scenario will require the use of a WAN?

Employees need to connect to the corporate email server through a VPN while traveling.

An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.

Frame Relay MetroE

Which two WAN infrastructure services are examples of private connections? (Choose two.)

Frame Relay T1/E1

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

GRE

Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?

GRE over IPsec

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

IPsec virtual tunnel interface

Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?

IPsec virtual tunnel interface

Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)

ISR router another ASA

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses.

Which statement describes an important characteristic of a site-to-site VPN?

It must be statically set up.

Which is a requirement of a site-to-site VPN?

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Which type of VPN has both Layer 2 and Layer 3 implementations?

MPLS VPN

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

NAT provides a solution to slow down the IPv4 address depletion. NAT introduces problems for some applications that require end-to-end connectivity.

How is "tunneling" accomplished in a VPN?

New headers from one or more VPN protocols encapsulate the original packets.

What type of address is 128.107.240.239?

Public

What type of address is 198.133.219.148?

Public

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

Router# show ip nat translations

What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)

SHA AES

What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

SHA MD5

Which type of VPN connects using the Transport Layer Security (TLS) feature?

SSL VPN

Which type of VPN uses the public key infrastructure and digital certificates?​

SSL VPN

What is a disadvantage of NAT?

There is no end-to-end addressing.

Which two statements about the relationship between LANs and WANs are true? (Choose two.)

WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​ WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.

Which circumstance would result in an enterprise deciding to implement a corporate WAN?

When its employees become distributed across many branch locations

demarcation point

a point that is established in a building or complex to separate customer equipment from service provider equipment

What is the function of the Diffie-Hellman algorithm within the IPsec framework?

allows peers to exchange shared keys

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

data terminal equipment

customer devices that pass the data from a customer network or host computer for transmission over the WAN.

customer premises equipment

devices and inside wiring located on the enterprise edge and which connect to a carrier link

data communications equipment

devices that put data on the local loop.

What is a disadvantage when both sides of a communication use PAT?

end-to-end IPv4 traceability is lost.

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

guarantees message integrity The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The Hashed Message Authentication Code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

integrity

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

leased line Ethernet WAN

In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?

outside global

What does NAT overloading use to track multiple internal hosts that use one inside global address?

port numbers

What type of address is 10.100.126.126?

private

What type of address is 10.100.34.34?

private

What type of address is 10.131.48.7?

private

What type of address is 10.19.6.7?

private

What type of address is 192.168.7.126?

private

What type of address is 64.100.190.189?

public

What type of address is 64.101.198.107

public

What type of address is 64.101.198.197?

public

Which two technologies provide enterprise-managed VPN solutions? (Choose two.)

remote access VPN site-to-site VPN Enterprise VPNs - Enterprise-managed VPNs are a common solution for securing enterprise traffic across the internet. Site-to-site and remote access VPNs are examples of enterprise managed VPNs. Service Provider VPNs - Service provider managed VPNs are created and managed over the provider network. Layer 2 and Layer 3 MPLS are examples of service provider managed VPNs. Other legacy WAN solutions include Frame Relay and ATM VPNs.

Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)

router another ASA

What two addresses are specified in a static NAT configuration?

the inside local and the inside global


Related study sets

Chapter 42: Stress and Adaptation

View Set

Optics III final L4: Polarization and Scattering

View Set

PED101 "Get Fit Stay Well" Ch. 10

View Set

Chapter 37: Management of Patients with Musculoskeletal Trauma - ML3

View Set

Math 047J (Basic Multiply & Divide problems)

View Set