Communication and Network Security (WAN and MAN) Flashcards
A backbone that connects LANs to each other and LANs to WANs, the Internet, and telecommunications and cable networks.
MAN
Metropolitan Area Network
MAN architectures are comonly built upon the following layers:
Access
Aggregation/distribution
(Metro)
Core
A method of combining multiple channels of data over a single transmission path.
aka sharing a line with many different entities
Multiplexing
__________ encapsulates data in FIXED cell size and can be used to deliver data over a SONET network. It’s like the cars that travel on the highway SONET provides.
Asynchronous Transfer Mode
ATM
_____ is the ATM equivalent for rest of the world. The two require a gateway to provide signaling translation.
Synchronous Digital Hierarchy
SDH
Dedicated links, also called leased-lines or point-to-point links include which of the following? (You can choose more than one)
A. T-carriers
B. E-carriers
C. Optical Carriers
D. WAN carriers
A, B, C
This type of multiplexing analyzes statistics related to the typical workload of each input device (printer, fax, computer) and determines in real time how much time each device should be allotted for data transmission.
A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D wave-division multiplexing
C
This type of multiplexing is used in T-Carriers.
A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D wave-division multiplexing
A
This type of multiplexing uses an available wireless spectrum to move data.
A. time-division multiplexing
B. frequency-division multiplexing
C. statistical time-division multiplexing
D. wave-division multiplexing
B
This T-Carrier type provides 1 channel with speed of up to 0.064
a. Fractional
b. T1
c. T2
d. T4
a
T1 can multiplex up to ____ number of channels with speeds up to _____
a. ) 12, 1.544 Mbps
b. ) 24, 1.544 Mbps
c. ) 96, 6.312 Mbps
d. ) 4032, 274,760 Mbps
b
This is needed when digital equipment will be used to connect a LAN to a WAN. It is not always a separate device.
CSU/DSU
Channel Service Unit/Data Service Unti
Which does this describe? Circuit switching or packet switching?
Connection-oriented virtual links
Traffic travels in a predictable manner
Fixed delays
ISDN and telephone calls are examples of it
circuit switching
Which of the following WAN protocols is in most use today?
A. ATM
B. Frame Relay
C. X.25
D. FDDI
A
In order to perform traffic shaping, you must use technologies that have __________________ capabilities.
QoS
_______ is a framing (data link) protocol that is used mainly for device-to-device communication such as two routers communicating over a WAN link.
a. X.25
b. ATM
c. HDLC
d Frame Relay
c
PPP is a data link protocol that carries out framing and encapsulation for point-to-point connections. Typically how systems on your LAN know how to communicate with ISP device. Has user authentication capabilities through CHAP, EAP and this protocol, which sends passwords in cleartext and is insecure.
PAP
This WAN technology provides data encapsulation method for synchronous serial links. Can provides point-to-point and multipoint communication.
A. X.25
B. Frame Relay
C. HDLC
D. SDLC
HDLC
DTE/DCE interface to enable high speed communication over WAN links
HSSI
High-Speed Serial Interface
High performance WAN protocol that uses packet-switching technology which works over public networks. Fee based on bandwidth used.
A. X.25
B. Frame Relay
C. HDLC
D. SDLC
Frame Relay
The use of this protocol can provide a secure channel for VoIP client/server communication and prevents the possibility of eavesdropping and packet manipulation.
TLS
This tunneling protocol works at the data link layer, extends and protects PPP connections, and transmits over IP networks ONLY. Cannot support multiple connections over one VPN tunnel.
PPTP
This tunneling protocol works at the data link layer, extends and protects PPP connections, and transmits over multiple types of networks, not just IP (Frame Relay, ATM). Combines with IPSec for security.
L2TP
This tunneling protocol handles multiple VPN connections at the same time, provides secure authentication and encryption, supports only IP networks, and focuses on LAN-to-LAN communication rather than user-to-user communication.
IPSec
This tunneling protocol works at the SESSION layer and protects mainly web and e-mail traffic. Can only protect a small number of protocol types, thus is not an infrastructure-level VPN solution.
TLS
This authentication method uses a challenge/response mechanism to authenticate the user instead of having the user send a password over the wire. The sender and receiver must use a symmetric key.
CHAP
Which IPSec suite protocol provides a framework for security association creation and key exchange?
a AH
b IKE
c. ISAKMP
d. ESP
ISAKMP
Internet Security Association and Key Management Protocol
Which IPSec suite protocol provides confidentiality, data-origin authentication, and data integrity?
ESP
Encapsulating Security Payload
Which of the following leaves headers, addresses, routing information, and trailer information encrypted. End-to-end encryption or Link encryption?
End-to-end encryption
FDDI is a LAN and MAN technology, usually used for backbones, that uses ____________ technology and has redundant rings in case the primary ring goes down.
token-passing
What is 802.5?
Token Ring
When was SSL formally deprecated?
June 2015