chapter 6 Flashcards
- Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)
IPsec
PPTP
- What are the three main functions of a secure VPN? (Choose three.)
authentication
data confidentiality
data integrity
Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
AES
DES
RSA
While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?
Data is being transmitted from the subscriber to the headend.
Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)
allocate an additional channel
subdivide the network to reduce users on each segment
Data confidentiality through a VPN is achieved through which two methods? (Choose two.)
encryption
encapsulation
What two protocols provide data authentication and integrity for IPsec? (Choose two.)
AH
ESP
Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)
digital certificates
smart cards
Which is an example of symmetric-key encryption?
pre-shared key
Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office?
a remote-access VPN
After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?
The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.
Which two statements about DSL are true? (Choose two.)
local loop can be up to 3.5 miles (5.5km)
user connections are aggregated at a DSLAM located at the CO
A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker’s site?
a WiMAX receiver
A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?
DSL
Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)
channel widths
modulation techniques