Chapter 8 - WAN for the Enterprise Flashcards

1
Q

What are two modules or blocks used in the enterprise edge?

  1. Internet and campus core
  2. Core and building access
  3. Internet and DMZ
  4. WAN and building distribution
A

C. Internet, remote-access DMZ, and service provider edge are the only modules or blocks used in the enterprise edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which enterprise edge module is used for e-commerce applications and remote-access VPNs?

  1. Data center
  2. WAN
  3. Service provider
  4. DMZ
A

D. E-commerce and remote-access services use the DMZ in the enterprise edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much bandwidth does a 4G LTE Advanced download connection provide?

  1. 100 Mbps
  2. 300 Mbps
  3. 600 Mbps
  4. 10 Gbps
A

C. 4G LTE Advanced download peak rates are up to 600 Mbps, and upload peak rates are up to 100 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are Layer 2 VPN options from service providers? (Choose two.)

  1. VPWS
  2. GPRS
  3. MPLS Layer 3 VPN
  4. VPLS
A

A and D. Both VPWS and VPLS are Layer 2 VPN technologies that service providers offer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technology delivers IP services using labels to forward packets from the source to the destination?

  1. 4G LTE
  2. SD-WAN
  3. Metro Ethernet
  4. MPLS
A

D. Multiprotocol Label Switching (MPLS) uses labels appended to IP packets or Layer 2 frames for the transport of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following technologies increases the bandwidth capabilities of fiber by using different wavelengths of light?

  1. Dark fiber
  2. Metro Ethernet
  3. GSM
  4. DWDM
A

D. Dense wavelength-division multiplexing (DWDM) increases the bandwidth capabilities of fiber by using different wavelengths of light called channels over the same fiber strand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following VPN options does not work on public networks that use NAT?

  1. GETVPN
  2. Extranet VPN
  3. Remote-access VPN
  4. Site-to-site VPN
A

A. GETVPN is not typically used on the Internet because NAT does not work due to the original IP addressing preservation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Layer 2 VPN technology provides a point-to-point WAN link between two sites over an MPLS backbone?

  1. DWDM
  2. GRE
  3. VPLS
  4. VPWS
A

D. VPWS provides a point-to-point WAN link between two sites over an MPLS provider backbone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What VPN technology uses a combination of IPsec and GRE?

  1. DMVPN
  2. GETVPN
  3. MPLS Layer 3 VPN
  4. IKE
A

A. Dynamic Multipoint VPN (DMVPN) is a Cisco IOS solution for building IPsec over GRE VPNs in a dynamic and scalable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What VPN technology uses traffic engineering to override routing tables with specific paths through the network?

  1. GETVPN
  2. GRE
  3. DMPVN
  4. MPLS Layer 3 VPN
A
  1. D. MPLS labels can be used to implement traffic engineering by overriding the routing tables with specific paths through the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With the Cisco SD-WAN solution, the control plane builds and maintains the network topology and informs the data plane on where traffic flows by using the _______________ controller.

  1. vEdge
  2. vSmart
  3. vManage
  4. vBond
A

B. The control plane builds and maintains the network topology and informs the data plane on where traffic flows by using the vSmart controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which module is within the enterprise edge module?

  1. Data center module
  2. Campus core
  3. Building distribution
  4. Remote-access VPN DMZ
A

D. Remote-access VPN DMZ resides in the Enterprise Edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology forms tunnel-less VPNs over private WANs?

  1. MPLS Layer 3 VPN
  2. VPLS
  3. GETVPN
  4. DMVPN
A

C. GETVPN forms tunnel-less VPNs over private WANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two modules are found in the enterprise edge? (Choose two.)

  1. Campus core
  2. Building access
  3. Internet
  4. DMZ
A

C and D. Internet and DMZ are two modules found in the enterprise edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following tunneling technologies lacks security and scalability?

  1. MPLS Layer 3 VPN
  2. DMVPN
  3. GRE
  4. GETVPN
A

C. GRE is a tunneling technology that lacks security and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most popular VPN technology that leverages BGP to distribute VPN-related information?

  1. IPsec
  2. GETVPN
  3. DMVPN
  4. MPLS Layer 3 VPN
A

D. MPLS is the most popular VPN technology that leverages BGP to distribute VPN-related information.

17
Q

Which of the following best describes the operation of VPLS?

  1. Allows for connecting Layer 2 domains over an IP/MPLS network
  2. Creates point-to-point WAN links between two sites over an MPLS backbone
  3. Creates a mapping database for all spoke tunnels to real public addresses
  4. Secures data from eavesdropping and modification of transform sets
A

A. VPLS allows for connecting Layer 2 domains over an IP/MPLS network.

18
Q

Which of the following modules belongs in the enterprise edge?

  1. Building distribution
  2. Campus core
  3. Network management
  4. DMZ/e-commerce
A

D. DMZ/e-commerce modules belong in the enterprise edge.

19
Q

Which network module connects to ISPs in the enterprise edge?

  1. Building distribution
  2. Campus core
  3. WAN edge
  4. Service provider edge
A

D. Service provider edge network modules connect to ISPs in the enterprise edge.

20
Q

Which network module connects using MPLS connectivity?

  1. Remote-access VPN
  2. Campus core
  3. Building access
  4. WAN edge
A

D. WAN edge network modules connect using MPLS connectivity.

21
Q

Which network module connects using SD-WAN?

  1. Remote-access VPN
  2. WAN edge
  3. Building distribution
  4. Server farm
A

B. WAN edge network modules connect using SD-WAN.

22
Q

What IPsec protocol is used to provide confidentiality, data origin authentication, connectionless integrity, and anti-replay services?

  1. ISAKMP
  2. ESP
  3. AH
  4. HMAC
A

B. ESP, an IPsec protocol, is used to provide confidentiality, data origin authentication, connectionless integrity, and anti-replay services.

23
Q

1What functional area provides connectivity between the central site and remote sites?

  1. Access
  2. Campus core
  3. Building distribution
  4. WAN edge
A

D. The WAN edge is a functional area that provides connectivity between the central site and remote sites.

24
Q

Which 4G standard is pushing download rates of 1 Gbps?

  1. LTE Advanced
  2. UMTS
  3. LTE Advance Pro
  4. LTE
A

C. LTE Advanced Pro is a 4G standard that is pushing download rates of 1 Gbps.

25
Q

Which WAN technology is circuit based and delivers high-speed services using Optical Carrier rates?

  1. SONET/SDH
  2. DWDM
  3. UTMS
  4. Dark fiber
A

A. SONET/SDN is circuit based and delivers high-speed services using Optical Carrier rates.

26
Q

Which emerging wireless standard uses sub-6 GHz and download rates of 20 Gbps?

  1. LTE
  2. LTE Advanced
  3. 5G
  4. UMTS
A

C. 5G is an emerging wireless standard that uses sub-6 GHz and download rates of 20 Gbps.

27
Q

_____ improves the utilization of optical-fiber strands.

A

DWDM improves the utilization of optical-fiber strands.

28
Q

Which of the following best describes the advantages of private WAN links?

  1. Provider responsibility for maintenance
  2. High security and transmission quality
  3. Only best-effort bandwidth guarantees
  4. Support for dynamic routing protocols
A

B. High security and transmission quality are advantages of private WAN links.

29
Q

What are two benefits of Ethernet handoffs at the customer edge? (Choose two.)

  1. No need for new customer premises equipment
  2. Ease of integration with existing LAN equipment
  3. Longer contract periods
  4. No need for NAT in connecting to public networks
A

A and B. No need for new customer premises equipment and ease of integration with existing LAN equipment are benefits of Ethernet handoffs at the customer edge.

30
Q

With the Cisco SD-WAN solution, the data plane is responsible for forwarding packets with instructions from the control plane through what router?

  1. vEdge
  2. vSmart
  3. vManage
  4. vBond
A

A. The data plane is responsible for forwarding packets with instructions from the control plane through vEdge routers.

31
Q

What do service providers use to define their network availability at different levels?

  1. SD-WAN
  2. WAN tiers
  3. WWAN
  4. SLAs
A

D. Service providers use SLAs to define their network availability at different levels.

32
Q

With the Cisco SD-WAN solution, the management plane is responsible for centralized management and monitoring through the use of _________.

  1. vEdge
  2. vSmart
  3. vManage
  4. vBond
A

C. The management plane is responsible for centralized management and monitoring through the use of vManage.

33
Q

With MPLS implementations, which of the following router types handles the exchange of customer routing information with the service provider?

  1. P routers
  2. CE routers
  3. PE routers
  4. FE routers
A

B. CE router types handle the exchange of customer routing information with the service provider.

34
Q

Which of the following are key objectives of an effective WAN design? (Choose three.)

  1. The WAN needs to support the goals and policies of the organization.
  2. The WAN needs to be fully meshed with PKI and certificate authentication.
  3. WAN technologies need to meet the current application requirements and provide for growth.
  4. WAN design should incorporate security throughout and ensure high availability where applicable while staying within budget.
A

A, C, and D. A fully meshed WAN with PKI and certificate authentication are not objectives of an effective WAN design.

35
Q

With GETVPN, what maintains the control plane and defines the encryption policies that are pushed to IKE authenticated group members?

  1. GDOI
  2. GRE
  3. Key servers
  4. PKI
A

C. Key servers maintain the control plane and define the encryption policies that are pushed to IKE authenticated group members.

36
Q

Which VPN technology uses a Multipoint GRE (mGRE) interface to provide support for multiple GRE and IPsec tunnels?

  1. MPLS Layer 3 VPN
  2. VPLS
  3. GETVPN
  4. DMVPN
A

D. DMVPN uses a Multipoint GRE (mGRE) interface to provide support for multiple GRE and IPsec tunnels.

37
Q

2Which IPsec protocol is used to provide integrity and data origin authentication?

  1. AH
  2. ESP
  3. ISAKMP
  4. IKE
A

A. AH is used to provide integrity and data origin authentication.

38
Q
  1. What within IPsec provides protection from attacks such as man-in-the-middle, packet-replay, and data-integrity attacks?
  2. AH
  3. ESP
  4. ISAKMP
  5. HMAC
A

D. HMAC provides protection from attacks such as man-in-the-middle, packet-replay, and data-integrity.

39
Q

With IPsec, what is used to detect the loss of a peer IPsec connection?

  1. DPD
  2. ESP
  3. mGRE
  4. NAT
A

A. DPD detects the loss of a peer IPsec connection.