What type of connectivity does Comcast Business Dedicated Internet provide?
It provides a reliable, private path for network traffic and business applications between a customer’s LAN and the Internet.
Comcast’s network scalability allows bandwidth to grow from 2 Mbps up to _____ in select areas.
400 Gbps
What is the primary function of Ethernet Private Line (EPL)?
It delivers high-performance, point-to-point connectivity between two sites.
Which Comcast Business service enables customers to connect all physically distributed locations as an alternative to traditional hub-and-spoke topologies?
Ethernet Network Service (ENS).
Ethernet Virtual Private Line (EVPL) offers what type of virtual connection?
It provides point-to-multipoint connectivity from a single location to multiple locations from a single provider.
What is the purpose of the Comcast Business Direct2Cloud (D2C) service?
It offers a dedicated Layer 2 Ethernet connection from a designated location to a cloud service provider.
Comcast Business Wavelength Services offer dedicated point-to-point optical transport with bandwidth options of 10 Gbps or up to _____.
100 Gbps
What is the function of the stateful firewall offered in Comcast’s security portfolio?
It tracks active connections and analyzes incoming traffic to protect the network.
The DDoS Mitigation Service from Comcast Business is available for which two connectivity types?
DI + Managed Router (on-premises) and DI (top-net).
According to the security portfolio chart, Unified Security (UTM) on an Advanced SD-WAN connection monitors for which five types of threats?
Botnets, Malware, Phishing, Ransomware, and Insider Threats.
What is the primary difference between Endpoint Detection & Response (EDR) and Managed Detection & Response (MDR)?
MDR includes continuous monitoring and response from a 24/7 Security Operations Center (SOC) support team, while EDR focuses on the endpoint technology itself.
What is Comcast Business VoiceEdge?
It is a hosted voice and Unified Communications (UC) solution that serves as an alternative to traditional PBX products.
Comcast Business SIP Trunking is a VoIP service that can scale up to _____ concurrent call sessions (CCS).
800
What feature of SIP Trunking automatically reroutes incoming calls to an alternate trunk group in case of a natural disaster or power outage?
Destination unreachable.
What is the core offering of the Comcast Business Meraki Technology Stack?
An enterprise-grade, cloud-first networking and security platform combining SD-WAN, WiFi, switches, and unified security management.
The Meraki Technology Stack is available in what two management models?
It can be either a fully managed or a self-managed (customer-managed) experience.
What is a primary benefit of the Meraki Technology Stack’s single dashboard?
It provides full-stack visibility with real-time insights and control across SD-WAN, WiFi, switches, and security in a single pane of glass.
One of the key use cases for the Meraki Technology Stack is to achieve cost and performance efficiencies while replacing fixed _____ lines.
MPLS
The security built into the Meraki Technology Stack is backed by threat detection and _____ for reliable security.
Unified Threat Management (UTM)
What is the function of Secure Access Service Edge (SASE)?
It combines wide-area networking (WAN) and network security services into a single, cloud-based service model.
Which four security functions are core components of Comcast’s SASE solution?
SD-WAN, Firewall as a Service (FWaaS), Secure Web Gateway (SWG), and Zero Trust Network Access (ZTNA).
Comcast’s Secure Network Edge solution is designed for what type of customer?
Small footprint organizations with one or a few standalone locations that need reliable site-to-SaaS and site-to-cloud connectivity.
For midsize customers with multiple locations and site-to-site connectivity needs, which Managed SD-WAN solution is recommended?
Managed SD-WAN Secure OTT (Over the Top).
What is AIOps used for within Comcast’s SD-WAN and SASE solutions?
It is used for AI-enhanced optimization, predicting and helping prevent outages, and providing real-time analytics and Shadow IT discovery.