Comparing WAN Links And Remote Access Methods Flashcards

1
Q

Location that represents the end of the access providers network (and therefore their responsibility for maintaining it). The demarc point is usually at the minimum point of entry (MPOE). If routing equipment cannot be installed at this location demarc extension cabling may need to be laid

A

Demarcation point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

System was developed by Bell labs to allow multiple calls to be placed on a single cable. Each 64 Kbps channel provides enough bandwidth for a voice communication session and is known as a DS0 or a kilo stream link. Channels can be multiplexed over a leased line to provide more bandwidth (T1, T2, T3 and so on).

A

T-carrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Termination point for an access providers cabling, also referred to as the network interface unit (NIU).

A

Smartjack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Appliance or WAN interface card providing connectivity to a digital circuit. The DSU encodes the signal from Data Terminal Equipment (DTE) a PBX router to a signal that can be transported over the cable. The CAU is used to perform diagnostic tests on the line

A

Channel service unit/data service unit (CSU/DSU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Carrier technology to implement broadband Internet access for subscribers by transferring data over voice-grade telephone lines. There are various flavors of DSL notably S(ymmetric)DSL, A(symmetric)DSL, and V(ery HIgh Bit Rate)DSL

A

Digital subscriber line (DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cable internet access digital modem that uses a coaxial connection to the service providers fiber optic core network

A

Cable modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

City wide fiber optic networks enabling carrier Ethernet virtual private networks and WAN links and full fiber Internet access

A

Metro-optical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technology based on DWDM to provision near fiber internet access solutions (FTTx-Fiber to the home , Fiber to the curb, etc.)

A

Passive optical network (PON)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System of microwave transmissions where orbital satellites relay signals between terrestrial receivers or other orbital satellites. Satellite internet connectivity is enabled through a reception antenna connected to the PC or network through a DVB-S modem.

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secure tunnel created between two endpoints connected via an insecure transport network (typically the Internet)

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dial up protocol working at layer 2 (Data Link) used to connect devices remotely to networks

A

Point to point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tunneling protocol allowing the transmission of encapsulated frames or packets from different types of network protocol over an IP network

A

Generic routing encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN configuration where only traffic for the private network is routed by the VPN gateway

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN configuration where all traffic is routed via the VPN gateway

A

Full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote access took and protocol. VNC is the basis of macOS screen sharing.

A

Virtual Network Computing (VNC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using features of HTML5 to implement Remote Desktop/VPN connections via browser software (clientless). Also called clientless VPN

A

HTML5 VPN or clientless VPN

17
Q

Appliance that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels, often in hub and spoke S2S VPN topologies

A

VPN headend

18
Q

Software based mechanism that allows VPNs to be built and deleted dynamically

A

Dynamic multipoint VPN (DMVPN)

19
Q

Network protocol suite used to secure data through authentication and encryption as the data travels across the network of the internet

A

Internet Protocol Security (IPSec)

20
Q

IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks

A

Authentication header (AH)

21
Q

IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet

A

Encapsulating security payload (ESP)

22
Q

Framework for creating a security association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data

A

Internet key exchange (IKE)

23
Q

Accessing the administrative interface of a network appliance using a separate network form the usual data network. This could use a separate VLAN or a different kind of link, such as a dial up modem.

A

Out of band management (OOB)