Communication and Network Security (WAN and MAN) Flashcards

1
Q

A backbone that connects LANs to each other and LANs to WANs, the Internet, and telecommunications and cable networks.

A

MAN

Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAN architectures are comonly built upon the following layers:

A

Access
Aggregation/distribution
(Metro)
Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A method of combining multiple channels of data over a single transmission path.

aka sharing a line with many different entities

A

Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ encapsulates data in FIXED cell size and can be used to deliver data over a SONET network. It’s like the cars that travel on the highway SONET provides.

A

Asynchronous Transfer Mode

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is the ATM equivalent for rest of the world. The two require a gateway to provide signaling translation.

A

Synchronous Digital Hierarchy

SDH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dedicated links, also called leased-lines or point-to-point links include which of the following? (You can choose more than one)

A. T-carriers
B. E-carriers
C. Optical Carriers
D. WAN carriers

A

A, B, C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of multiplexing analyzes statistics related to the typical workload of each input device (printer, fax, computer) and determines in real time how much time each device should be allotted for data transmission.

A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D wave-division multiplexing

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of multiplexing is used in T-Carriers.

A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D wave-division multiplexing

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of multiplexing uses an available wireless spectrum to move data.

A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D. wave-division multiplexing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This T-Carrier type provides 1 channel with speed of up to 0.064

a. Fractional
b. T1
c. T2
d. T4

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T1 can multiplex up to ____ number of channels with speeds up to _____

a. ) 12, 1.544 Mbps
b. ) 24, 1.544 Mbps
c. ) 96, 6.312 Mbps
d. ) 4032, 274,760 Mbps

A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is needed when digital equipment will be used to connect a LAN to a WAN. It is not always a separate device.

A

CSU/DSU

Channel Service Unit/Data Service Unti

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which does this describe? Circuit switching or packet switching?

Connection-oriented virtual links
Traffic travels in a predictable manner
Fixed delays
ISDN and telephone calls are examples of it

A

circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following WAN protocols is in most use today?

A. ATM
B. Frame Relay
C. X.25
D. FDDI

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In order to perform traffic shaping, you must use technologies that have __________________ capabilities.

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ is a framing (data link) protocol that is used mainly for device-to-device communication such as two routers communicating over a WAN link.

a. X.25
b. ATM
c. HDLC
d Frame Relay

A

c

17
Q

PPP is a data link protocol that carries out framing and encapsulation for point-to-point connections. Typically how systems on your LAN know how to communicate with ISP device. Has user authentication capabilities through CHAP, EAP and this protocol, which sends passwords in cleartext and is insecure.

A

PAP

18
Q

This WAN technology provides data encapsulation method for synchronous serial links. Can provides point-to-point and multipoint communication.

A. X.25
B. Frame Relay
C. HDLC
D. SDLC

A

HDLC

19
Q

DTE/DCE interface to enable high speed communication over WAN links

A

HSSI

High-Speed Serial Interface

20
Q

High performance WAN protocol that uses packet-switching technology which works over public networks. Fee based on bandwidth used.

A. X.25
B. Frame Relay
C. HDLC
D. SDLC

A

Frame Relay

21
Q

The use of this protocol can provide a secure channel for VoIP client/server communication and prevents the possibility of eavesdropping and packet manipulation.

A

TLS

22
Q

This tunneling protocol works at the data link layer, extends and protects PPP connections, and transmits over IP networks ONLY. Cannot support multiple connections over one VPN tunnel.

A

PPTP

23
Q

This tunneling protocol works at the data link layer, extends and protects PPP connections, and transmits over multiple types of networks, not just IP (Frame Relay, ATM). Combines with IPSec for security.

A

L2TP

24
Q

This tunneling protocol handles multiple VPN connections at the same time, provides secure authentication and encryption, supports only IP networks, and focuses on LAN-to-LAN communication rather than user-to-user communication.

A

IPSec

25
Q

This tunneling protocol works at the SESSION layer and protects mainly web and e-mail traffic. Can only protect a small number of protocol types, thus is not an infrastructure-level VPN solution.

A

TLS

26
Q

This authentication method uses a challenge/response mechanism to authenticate the user instead of having the user send a password over the wire. The sender and receiver must use a symmetric key.

A

CHAP

27
Q

Which IPSec suite protocol provides a framework for security association creation and key exchange?

a AH
b IKE
c. ISAKMP
d. ESP

A

ISAKMP

Internet Security Association and Key Management Protocol

28
Q

Which IPSec suite protocol provides confidentiality, data-origin authentication, and data integrity?

A

ESP

Encapsulating Security Payload

29
Q

Which of the following leaves headers, addresses, routing information, and trailer information encrypted. End-to-end encryption or Link encryption?

A

End-to-end encryption

30
Q

FDDI is a LAN and MAN technology, usually used for backbones, that uses ____________ technology and has redundant rings in case the primary ring goes down.

A

token-passing

31
Q

What is 802.5?

A

Token Ring

32
Q

When was SSL formally deprecated?

A

June 2015