Complete Correct Answers (Rated A+)
New Update
What is the function of a Customer Edge (CE) router in a WAN? - Answers -✔✔ To
connect the customer's network to the provider's network
At which layer of the OSI model do WANs often use simpler protocols compared to
LANs? - Answers -✔✔ Data Link layer
Why do organizations often choose to use public networks for their WAN services? -
Answers -✔✔ Because the cost is far less than implementing a private solution
What role does a Cable Modem Termination System (CMTS) play in a cable internet
setup? - Answers -✔✔ It routes data traffic via the fiber backbone.
What is the purpose of a filter (splitter) in a DSL setup? - Answers -✔✔ To prevent noise
from affecting voice calls
What is the primary function of a T-carrier system? - Answers -✔✔ To enable voice
traffic digitization
What is the primary advantage of using Time Division Multiplexing (TDM) in T-carrier
systems? - Answers -✔✔ It enables the simultaneous transmission of multiple signals
over a single transmission path.
How is the ONT connected to the customer's router in FTTP? - Answers -✔✔ Using an
RJ45 Ethernet patch cord
What is the very short range rate of VDSL2? - Answers -✔✔ 100 Mbps bi-directional
What technology do service providers use to support FTTC? - Answers -✔✔ VDSL
You often travel away from the office. While traveling, you would like to use a modem
on your laptop computer to connect directly to a server in your office to access needed
files.
You want the connection to be as secure as possible. Which type of connection do you
need? - Answers -✔✔ Remote access
What makes TACACS+ different from RADIUS? - Answers -✔✔ TACACS+ separates
AAA functions.
, What is a common implementation of remote network access today? - Answers -✔✔
Virtual Private Network (VPN)
Which protocol is known for operating at the Network layer of the OSI model to
authenticate hosts and encrypt packets? - Answers -✔✔ IPSec
Which protocol is often used with other protocols to provision a secure tunnel due to its
lack of inherent security mechanisms? - Answers -✔✔ PPP
What does the Encapsulating Security Payload (ESP) protocol provide? - Answers -✔✔
Encryption of the payload and optional authentication
In the context of IPSec and IPv6, how are additional security features implemented
within the packet structure? - Answers -✔✔ Through the use of extension headers
Which mode of IPSec is used for communications between VPN gateways across an
unsecure network? - Answers -✔✔ Tunnel mode
Which feature of IKEv2 facilitates the use of a VPN through a home router/firewall? -
Answers -✔✔ NAT traversal
During which phase of IKE negotiations is the identity of the two peers established? -
Answers -✔✔ Phase I
What does a full tunnel VPN configuration do? - Answers -✔✔ Mediates internet access
through the corporate network
Which protocol is used in conjunction with IPSec to provide added security? - Answers -
✔✔ L2TP
Which VPN topology allows home-workers and employees in the field to connect to the
corporate network? - Answers -✔✔ Client-to-Site
What is a key feature of clientless VPNs that distinguishes them from traditional remote
desktop products and client-to-site VPNs? - Answers -✔✔ They allow connection
through a browser.
How do gateways in a Site-to-Site VPN establish a secure connection? - Answers -✔✔
By exchanging security information
Which protocol is typically used for remote configuration of network appliances? -
Answers -✔✔ SSH