WANs Flashcards

1
Q

What is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings called?

A

LAN (Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a geographically distributed network that connects multiple Local Area Networks together called?

A

WAN (Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a network that connects computers and other devices in a geographic area larger than a LAN but smaller than a WAN called?

A

MAN (Metropolitan Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This provides a virtual tunnel between private networks across a share public network such as the internet

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Traffic travelling over VPN tunnels is unencrypted

A

False. It’s encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Site to Site VPNs typically use what type of encryption?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connections between a router or firewall in the office and VPN software installed on an individual user’s device is called what?

A

Remote Access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of encryption do Remote Access VPNs typically use?

A

SSL but sometimes they use IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is an open standard configuration for a site to site VPN and it does not support multicast

A

IPSec Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This type of VPN configuration added support for multicast but doesn’t support encryption on it’s own so it has to be paired with IPSec Tunnel

A

GRE (Generic Routing Encapsulation) over IPSec Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of VPN configuration is used between Cisco devices, often site to site VPNs and is Cisco proprietary and supports multicast

A

IPSec VTI (Virtual Tunnel Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of VPN configuration is a simple and scalable hub and spoke style that enables direct full mesh connectivity between all offices

A

DMVPN (Dynamic Multipoint VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Very similar to DMVPN. Newer technology and it’s Cisco proprietary

A

FlexVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This configuration has centralized policy for VPN over non-public infrastructure (not the internet)

A

GETVPN (Group Encrypted Transport VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a dedicated physical connection between two locations with fixed, reserved bandwidth which is not shared by anyone else.

A

Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of WAN connection uses a serial connection requiring the correct physical interface card on the router

A

Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This type of WAN connection share the same characteristics as a leased line, typically more expensive and low bandwidth. May be the only option is hard to reach areas

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This type of WAN connection has T1, T2, T3 and T4

A

Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does MPLS stand for?

A

Multi Protocol Label Switching

20
Q

This type of WAN connection is where traffic from multiple customers can travel over the provider’s shared network, so this is considered a VPN service

21
Q

MPLS VPNs provide this type of topology by default

22
Q

Leased Lines use what kind of link?

A

Point to Point

23
Q

In regards to MPLS what do these stand for?

CE
PE
P

A

CE - Customer Edge Device
PE - Provider Edge Device
P - Provider Core Device

24
Q

True or False: Customer Edge devices run MPLS

A

False. Only the Provider Edge and Provider Core devices run MPLS

25
With MPLS, what devices do static routes and routing protocols run on?
Customer Edge device and the Provider Edge Device
26
With MPLS, are the customer's devices oblivious to the providers core devices?
Yes. They only see the Providers edge device but not their core device
27
What is different about Layer 3 MPLS vs. Layer 2 MPLS?
The CE devices do not peer with the PE devices. The entire provider network is transparent to the customer
28
What does VPLS stand for and how many sites can it support and what layer does it run at?
- Virtual Private LAN Service - 2 or more sites - Layer 2
29
What does VPWS stand for and how many sites can it support and what layer does it reside at?
Virtual PsuedoWire Service 2 sites point to point Layer 2
30
What does PPPoE stand for and what deployments is it typically used for?
Point to Point Protocol over Ethernet normally used in DSL deployments
31
What does DSL stand for?
Digital Subscriber Line
32
What is the standard used in North America for service provider optical fiber networks?
SONET (Synchronous Optical Network)
33
What is the standard used in the rest of the world for service provider optical fiber networks?
SDH
34
What does DWDM stand for and what does it do?
Dense Wavelength Division Multiplexing Combines multiple optical signals into one signal transmitted over a single fiber strand
35
____________ allows more capacity to be added to existing infrastructure without expensive upgrades and allows more capacity to be added to existing infrastructure
DWDM (Dense Wavelength Division Multiplexing)
36
What are three backup solutions for corporate offices that might be typically aimed at home internet users?
DSL Cable Wireless (4G, LTE, 5G)
37
This type of WAN connection is more suitable for longer distance rathe than using copper wire
Optical Fiber
38
What does **FTTx** stand for?
**Fiber to the X:** Home Premises Building Neighborhood
39
Identify the topology based on the scenario: Simplistic, centralized security policy with one router being the hub that all traffic flows through for other sites
Hub and Spoke
40
What are the disadvantages of a hub and spoke?
Single point of failure and suboptimal traffic flow
41
**Identify the topology based on the scenario:** Removes the single point of failure by adding another hub to the topology, yet all traffic from other sites still flow these centralized hubs
Redundant Hub and Spoke
42
**Identify the topology based on the scenario:** All sites have a direct path to every other site resulting in optimal traffic flow
Full Mesh
43
**Identify the topology based on the scenario:** Similar to Hub and Spoke but one spoke site has connectivity to another through a leased line rather than having to go to the hub to get where it needs to go
Partial Mesh
44
**Identify this internet redundancy option:** Single service provider router to a customer router
Single Homed
45
**Identify this internet redundancy option:** Two service provider routers to two customer routers
Dual Homed
46
**Identify this internet redundancy option:** Two separate service providers and their routers going to the same customer's routers
Multi-homed
47
**Identify this internet redundancy option:** Full mesh of two separate service providers going to two customer routers
Dual Multi-homed