WAN Technology Flashcards

1
Q

Does not perform data encryption and therefore, information is passed as clear text.

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides data integrity and authentication, and anti-reply service. It ensures that a packet that crosses the tunnel is the same packet that left the peer device and no changes have been made. It uses a keyed hash to accomplish this.

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can provide data integrity and authentication, but its primary purpose is to encrypt data crossing the tunnel.

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The authentication component does not include any Layer 3 information. Therefore, this component can work in conjunction with a network using NAT.

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On Cisco devices, ESP supports encryption using Advanced Encryption Standard (AES), Data Encryption Standard (DES), or Triple DES (3DES).

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is used between Virtual Private Network (VPN) gateways such as routers, firewalls, and VPN concentrators.

A

Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is used between end-stations or between and end-station and a VPN gateway.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the default value in seconds for the dialer idle-timeout seconds command?

A

120 Seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which WAN protocol is used with synchronous and asynchronous connections and defines the frames type and interaction between two devices at the data link layer?

A

High-Level Data Link Control (HDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two frame relay encapsulations types are supported on Cisco routers?

A

Cisco and Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is responsible for negotiating and maintaining Point-to-Point Protocol (PPP) connections?

A

Link Control Protocol (LCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which encryption algorithm generates a set of keys which includes a public key and a private key?

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which encryption algorithm generates a set of keys which includes a public key and a private key?

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which option is used to allow the Frame Relay Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) to exchange status information about the Virtual Circuits and themselves?

A

Local Management Interface (LMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default frequency of routers in a frame relay environment to send Inverse Address Resolution Protocol (ARP) messages on active Data Link Connection Identifiers (DLCIs)?

A

60 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the asymmetric encryption algorithm?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which Cisco Internetwork Operating System (IOS) command is used to view the sham-links configured for the provider edge in the VPN backbone?

A

show ip ospf sham-links

18
Q

Which protocol defines the process of how the two Point-to-Point Protocol (PPP) peers negotiate with network layer protoco0ls, such as IP and IPX?

A

Network Control Protocol (NCP)

19
Q

Which authentication types can be used for Internet Key Exchange (IKE) peer authentication on Cisco devices?

A

RSA Signatures and digital certificates, Pre-shared keys, and RSA-encrypted nonces

20
Q

What Cisco Internetwork Operating System (IOS) command would correctly configure a static map of the remote IP address 192.168.144.25 to the local DLCI 401, but not allow broadcasts and multicasts over the virtual circuits (VC)?

A

the frame-relay map ip 192.168.144.25 401 command.

21
Q

Which protocol works with asynchronous and synchronous serial interfaces as well as High-Speed Serial Interfaces (HSSI0 and Integrated Services Digital Network (ISDN) interfaces (BRI and PRI)?

A

Point-to-Point Protocol (PPP)

22
Q

Which IOS Command is used to set the maximum amount of interface load before the dialer places another call?

A

the dialer load-threshold command

23
Q

Which IOS Command is used to set the maximum amount of interface load before the dialer places another call?

A

the dialer load-threshold command

24
Q

Which cable is used on a router’s wide area network (WAN) interface to connect to the serial ports?

A

Serial Cable

25
Q

Which signatures rely on digital signatures for Internet Key Exchange (IKE) peer authentication?

A

RSA signatures

26
Q

Which three Local Management Interface (LMI) types are supported on Cisco routers?

A

ANSI, Cisco, and Q933a

27
Q

Which protocol option should be selected to encrypt and transmit data between peer routers with high confidentiality?

A

Encapsulating Security Payload (ESP) in tunnel mode

28
Q

Which Dial on Demand Routing (DDR) command allows a sic minute delay before disconnecting a call?

A

the dialer idle-timeout 360 command

29
Q

Which Dial on Demand Routing (DDR) command allows a sic minute delay before disconnecting a call?

A

the dialer idle-timeout 360 command

30
Q

By default, how often does a Cisco router serial interface exchange Local Management Interface (LMI) keepalive packets?

A

every 10 seconds

31
Q

Which IOS command is used to view the information specific to the interface hardware?

A

the show controllers serial command

32
Q

Which protocol uses a one-way hash function based on the Message Digest 5 (MD5) hashing algorithm to has the password?

A

Challenge Handshake Authentication Protocol (CHAP)

33
Q

Which protocol uses a one-way hash function based on the Message Digest 5 (MD5) hashing algorithm to has the password?

A

Challenge Handshake Authentication Protocol (CHAP)

34
Q

Which IOS command is used to display the status of each configured connection, traffic statistics, and the number of Backward Explicit Congestion Notification (BECN) and Forward Explicit Congestion Notification (FECN) packets received by the router?

A

the show frame-relay pvc command

35
Q

Which IOS command is used to view the network layer address and associated DLCI for each remote destination?

A

the show frame-relay map

36
Q

Which IOS command is used to view the information on the LMI packets exchanged by the router and frame relay service provider?

A

the debug frame-relay lmi command

37
Q

Which cable type is the copper-wire LAN cabling standard defined by the Telecommunications Information Association (TIA)?

A

Unshielded Twisted Pair (UTP)

38
Q

Which IOS command is used to specify the frame relay encapsulation type?

A

the encapsulation frame-relay command

39
Q

Which two Unshielded Twisted Pair (UTP) cable categories support Gigabit Ethernet?

A

UTP Categories Cat 5 and Cat 6

40
Q

What IOS command would correctly configure a static map of the remote IP address 192.168.144.25 to the local DLCI 401 and allow broadcasts and multicasts over the virtual circuits (VC)?

A

the frame-relay ip 192.168.144.25 401 broadcast

41
Q

What protocol is used to dynamically create a PVC (permanent virtual circuit)?

A

Inverse ARP