Understanding IP tunneling Flashcards

1
Q

A _________ starts by making an encrypted connection between two computers

A

tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________ are used to encrypt unencrypted protocols

A

Tunnels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Very few Internet Protocols are ____________.

A

encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tunnels are often used with _______ _______ connections

A

remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ _______ ________ is a router technology that provides a labeling system to greatly improve performance and speed within network connections for private WANs

A

Multiprotocol label switching ( MPLS )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________________ uses MPLS technologies, but with better security for private WANs

A

Software-defined wide area network (SD-WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _______ ____ _______ does not use the Internet to connect and thus doesn’t require security, so it is more affordable also for private WANs.

A

Metropolitan area network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

many fiber connnections feature:

A

Bidirectional wavelength division multiplexing (WDM or BWDM)
Dense wavelength division multiplexing (DWDM) - allows single mode fiber optics to carry multiple signals using different wavelengths using multiple colors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this also used multiple wavelength of colors for faster signals over long distances, limited to 60 km

A

Coarse wavelength division multiplexing (CWDM) Private Wans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ DSL is where the upload and download speeds are the same

A

Symmetric DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________ DSL is where the download is super fast and the upload is slower

A

Asymmetric DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some companies that supply fiber to your home are using the same technology DSL and it called:

A

VDSL (very-high-bit-rate-DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DSL ______ is used to clear the phone line of the DSL noise

A

Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Satellite connections / service has terrible __________

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobil data started in the 1980’s

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Global System for Mobile Communications (GSM) relied on a technology called:

A

Time-Division multiple access ( TDMA) - allowed multiple user to share service at the same time by switching from one EU to the other.

17
Q

Global System for Mobile Communications (GSM) also introduced the _______ ________ so that a phone could actually connect to a wireless phone network.

A

Sim Card - Last one they used or designed was 2G, called
Enhanced Data rates for GSM Evolution (EDGE)

18
Q

This cell technology was after, incompatible, and more superior to GSM, that used a more spread spectrum of transmission by changing the frequencies for each user instead of splitting

A

Code-Division Multiple access (CDMA)

19
Q

This cell connection type or technology, is 4G / 300 mb download and 75 upload / introduced nano sims

A

Long Term Evolution (LTE)

20
Q

This cell connection type or technology runs on three bands ( low, medium, high ) up to 1GB sec

A

5G

21
Q

Remote technology for computers over an IP network:

A

started with a technology called Citrix that used Independent Computing Architecture (ICA)

22
Q

Another remote technology for connecting Macs to Linux is called

A

Tight Virtual Network Computing ( TightVNC ) uses port 5900

23
Q

Microsoft’s proprietary remote service is called:

A

Remote Desktop Protocol ( RDP ) used port 3389

24
Q

this remote technology creates a tunnel between a client and endpoint computers

A

Virtual Private Network ( VPN )

25
Q

VPN’s use or create a ______ _____ on the VPN client machine.

A

virtual NIC

26
Q

For a VPN to work, one machine has to have the ________ software and the other has be the VPN _______.

A

Client / Server

27
Q

VPN connections inside of Windows include:

A

Point to Point Tunneling Protocol ( PPTP ) - Microsoft - also use EAP
Layer 2 Tunneling Protocol w/IPsec ( L2TP/IPsec ) - Cisco
Secure Socket Tunneling Protocol ( SSTP ) - uses TLS (SSL)
IKEv2 - Uses pure IPsec solutions

28
Q

One Type of VPN model or type is a:

A

Client to Site VPN ( has one endpoint )

29
Q

In a VPN network, a router is typically called a:

A

VPN concentrator or headend and endpoint

30
Q

Another VPN model or type is known as a:

A

Site to Site VPN ( has one endpoint at each location )

31
Q

other VPN models or types:

A

OpenVPN
SSH ( Secure Shell )
Generic Routing Encapsulation ( GRE ) - is paired with IPsec and uses PPP through layer 3 including multicast and IPsec

32
Q

This WAN technology creates a secure, private network within a city using fiber optic cabling and Ethernet technology:

A

Metro Optical
( Metro Ethernet is also called the same thing )
(Sonet is an older version used)

33
Q

The modern port used for Simple Mail Transfer Protocol (SMTP) is:

A

Port 587