WAN Topologies Flashcards

1
Q

What are the three basic topology options for a WAN?

A

Hub and Spoke or Star

Full-Mesh

Partial Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the benefit of using a star topology?

What is the drawback?

A

Network simplicity

No redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of creating a dual-carrier WAN design?

A

Increase redundancy and path diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides a pre-established communications path from the customer premises through the provider network to a remote destination

A

Dedicated communications link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Establishes a dedicated virtual connection for voice or data between a sender and a receiver. Two examples of this are PTSN (Public switched telephone network) and ISDN (Integrated services digital network).

A

Circuit-switched communications link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is transmitted in labeled frames, cells, or packets and include Frame Relay, ATM (Asynchronous Transfer Mode) and X.25.

A

Packet-switched communications links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These links go through broadband services such as DSL, cable modem, and broadband wireless. They are combine with VPN technologies to provide privacy.

A

Internet WAN connection links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gives enterprises a way to create end-to-end circuits across any type of transport medium using any available WAN technology

A

MPLS (Multiprotocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of MPLS VPN is appropriate for customers that manage their own routing information?

A

Layer 2 MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of MPLS VPN is appropriate for customers that prefer to outsource their routing to a service provider?

A

Layer 3 MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These devices are responsible for encapsulating and encrypting traffic

A

VPN device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two available options for VPN encryption?

A

IP Sec SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of VPN?

A

Site to site

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A framework of open security standards that does not support broadcast or IP multicast.

A

IP Sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What addition to IP Sec can enable routing and multicast?

A

GRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Cisco proprietary site-to-site VPN option allows a simple hub and spoke configuration and zero touch configuration for new hosts?

A

DMVPN (Dynamic Multipoint Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What mode of IPsec configuration simplifies a VPN configuration?

A

VTI (Virtual Tunnel Interface)

18
Q

What are the two types of VTI?

A

static and dynamic

19
Q

Allows IP Sec to be immediately triggered to create point-to-point GRE tunnels without any IP Sec peering configuration.

A

DMVPN

20
Q

Connects the CPE to the nearest exchange of the service provider.

A

Local loop

21
Q

Takes digital data from the communications technology that’s used on a LAN and converts it into a frame thats appropriate for a WAN and vise versa

A

CSU/DSU

22
Q

Router that resides in the middle or backbone of a WAN rather than its periphery

A

Core router

23
Q

Device that interprets digital and analog signals enabling data to be transmitted over voice-grade telephone lines

A

Modem

24
Q

Used where a fiber-optic link terminates in order to convert optical signals into electrical signals and vice versa

A

Optical fiber converters

25
Q

Device that is used to connect DTE to a digital circuit, such as a T1 carrier line. A device is considered DTE if it is either a source or destination for digital data. Examples of DTE include PCs, servers, and routers.

A

CSU/DSU

26
Q

What are two types of Layer 2 MPLS VPN technologies?

A

VPLS

VPWS

27
Q

What protocol provides confidentiality, data integrity, authentication, and antireplay protection

A

IPsec

28
Q

What service ensures that transmitted has not been changed or altered in any way?

A

data integrity

29
Q

What are the main components of MPLS?

A

Control plane Data Plane

30
Q

A protocol that is typically used when configuring a virtual private network (VPN)

A

L2TP (Layer 2 Tunneling Protocol)

31
Q

VPN technology that leverages the strengths of IP Sec, GRE, and Next-Hop Resolution Protocol (NHRP) to simplify the implementation of highly scalable, secure networks.

A

DMVPN

32
Q

Which of the following topology terms most closely describe the topology created by a Metro Ethernet Tree (E-Tree) service? (Choose two answers.)

Partial Mesh

Full Mesh

Hub and Spoke

Point-to-point

A

Partial Mesh

Hub and spoke

A Metro Ethernet E-Tree service uses a rooted point-to-multipoint Ethernet Virtual Connection (EVC), which means that one site connected to the service (the root) can communicate directly with each of the remote (leaf) sites. However, the leaf sites cannot send frames directly to each other; they can only send frames to the root site.

33
Q

Which component of VPN technology ensures that data is unaltered between the sender and recipient?

A. encryption
B. authentication
C. key exchange
D. data integrity

A

D. data integrity

34
Q

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?

A. Cisco IOS IPsec/SSL VPN Client
B. Cisco Adaptive Security Appliance
C. Cisco VPN Client
D. ISDN terminal adapter

A

B. Cisco Adaptive Security Appliance

35
Q

Which two data integrity algorithms are commonly used in VPN solutions? (Choose two.)

A. DH1
B. DH2
C. HMAC-MD5
D. HMAC-SHA-1
E. RSA

A

C. HMAC-MD5
D. HMAC-SHA-1

36
Q

What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.)

A. reduced cost
B. better throughput
C. broadband incompatibility
D. increased security
E. scalability
F. reduced latency

A

A. reduced cost

D. increased security

E. scalability

37
Q

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

A. RSA
B. L2TP
C. IPsec
D. PPTP

A

C. IPsec

38
Q

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?

A. It avoids split-horizon issues with distance vector routing protocols.
B. IP addresses can be conserved if VLSM is not being used for subnetting.
C. A multipoint interface offers greater security compared to point-to-point subinterface configurations.
D. The multiple IP network addresses required for a multipoint interface provide greater addressing flexibility over point-to-point configurations.

A

B. IP addresses can be conserved if VLSM is not being used for subnetting.

39
Q

What two encryption algorithms are used in IPSec VPNs?

A. DH

B. PSK

C. IKE

D. AES

E. 3DES

A

D. AES

E. 3DES

40
Q

Which three statements describe the building blocks that make up the IPSec protocol framework? (Choose three)

A. IPSec uses encryption algorithms and keys to provide secure transfer of data

B. IPSec uses Diffie-Hellman algorithms to encrypt data that is transfered through the VPN

C. IPSec uses 3DES algorithms to provide the highest level of security for data that is transfered through a VPN.

D. IPSec uses secret key cryptography to encrypt messages that are sent through a VPN

E. IPSec uses Diffie-Hellman as a hash algorithm to ensure integrity of data that is transmitted through a VPN

F. IPSec uses ESP to provide confidential transfer of data by encrypting IP packets.

A

A. IPSec uses encryption algorithms and keys to provide secure transfer of data

D. IPSec uses secret key cryptography to encrypt messages that are sent through a VPN

F. IPSec uses ESP to provide confidential transfer of data by encrypting IP packets.

41
Q

What is an IPsec protocol that provides data confidentiality and authentication for IP packets?

A

ESP