WAN Flashcards

(23 cards)

1
Q

Which two statements about provider-managed VPNs are true? (Choose two.)

Provider-managed VPNs are used when remote sites connect over internet.

Provider-managed Layer 2 MPLS VPNs do not isolate customers’ traffic.

Provider-managed VPNs use IPsec to isolate customers’ traffic.

Provider-managed Layer 3 MPLS VPNs make the provider’s network appear as a router for each connected customer.

Provider-managed Layer 2 MPLS VPNs make remote customer sites appear as directly connected.

A

Provider-managed Layer 3 MPLS VPNs make the provider’s network appear as a router for each connected customer.

Provider-managed Layer 2 MPLS VPNs make remote customer sites appear as directly connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which wired broadband internet access technology option uses twisted-pair telephone lines for transport?

DOCSIS

LTE

FTTx

ADSL

A

ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two options are site-to-site VPN options? (Choose two.)

Frame Relay

DSL

DMVPN

ATM

IPsec

A

DMVPN and IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which optical technology provides highest data rates?

SONET

FTTx

DWDM

SDH

A

DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which three options are classified as internet-based WAN connectivity options? (Choose three.)

MPLS

Metro Ethernet

xDSL

cable

T1/E1

cellular 4G

A

xDSL, cable, and cellular 4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement about site-to-site VPN deployment mode is true?

End devices that source messages are aware that VPN exists between them and the remote location.

In cryptographic VPN site-to-site deployment, the end device encrypts the content to be sent over the VPN.

Hub-and-spoke is the only VPN topology that can be implemented to interconnect more than two remote locations.

In a site-to-site VPN, a tunnel is built between VPN gateways present at each of the sites.

A

In a site-to-site VPN, a tunnel is built between VPN gateways present at each of the sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A NAT-enabled router is configured to perform inside PAT. The IPv4 packet arrives at the outside interface of the router, as a response to the client in the inside network. Provided that inside PAT is correctly configured, which fields in the received IPv4 packets must match to which NAT mapping element, for the packet to be forwarded to the inside host?

Destination IPv4 address and destination port number must match outside global address and port in the mapping table.

Source IPv4 address and source port number must match inside global address and port number in the mapping table.

Source IPv4 address and source port number must match inside local address and port number in the mapping table.

Destination IPv4 address and destination port number must match inside global address and port in the mapping table.

A

Destination IPv4 address and destination port number must match inside global address and port in the mapping table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of entering the ip nat inside source static tcp 192.168.10.2 80 209.165.200.223 8080 command at the global configuration prompt?

It identifies the inside NAT interface on the router.

It prevents the router from establishing a connection with any device that does not have the specified address and port number.

It binds the inside local address and local port to the specified inside global address and global port.

It enables a one-to-one translation between different internal port numbers.

A

It binds the inside local address and local port to the specified inside global address and global port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the drawbacks of NAT is that it might disrupt services that require the initiation of TCP connections from the outside network or disrupt stateless protocols, such as those using UDP. Why is NAT disruptive in these two cases?

Inbound (outside to inside connections) depend on the presence of NAT mapping to be forwarded to the receiving host inside the network. NAT mappings can time out and, therefore, prevent the device from translating the incoming packets, which end up discarded.

TCP connections require three-way handshake to be completed. NAT allows initial TCP segment, which has flags SYN and ACK set to pass only from the inside to the outside and not from the outside to the inside.

NAT does not translate packets for protocols that do not establish connections and do not maintain the state of the connections.

For applications that use UDP, NAT always translates both IPv4 address and port number. Since UDP applications can use whatever port number, it is impossible to make mappings for all; therefore, NAT translations will not happen and UDP segments get discarded.

A

Inbound (outside to inside connections) depend on the presence of NAT mapping to be forwarded to the receiving host inside the network. NAT mappings can time out and, therefore, prevent the device from translating the incoming packets, which end up discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two statements correctly describe port forwarding? (Choose two.)

Port forwarding is defined as a static mapping.

Port forwarding enables devices in the private network to reach critical services in external networks.

Port forwarding enables local resource in private network to be available to external networks.

Port forwarding changes only port numbers and is a mechanism that forces applications to use arbitrarily chosen port numbers.

Port forwarding is dynamic translation mechanism that enables multiple hosts from external networks to access the same resource in the private network.

Port forwarding statically defines multiple ports and the number of ports determines how many connections can be established to the same resource in the private network.

A

Port forwarding is defined as a static mapping.

Port forwarding enables local resources in the private network to be available to external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To configure NAT, one of the commands the administrator used was ip nat pool NAT-POOL 209.165.201.5 209.165.201.10 netmask 255.255.255.240. Assume that outside routers do not have a default route configured. Which two networks could be present in the routing tables of outside routers so that the two-way reachability exists between inside and outside hosts? (Choose two.)

route to 209.165.201.4/28 network

route to 209.165.201.0/28 network

route to 209.165.201.0/24 network

route to 172.16.1.0/24 network

route to 172.16.0.0/16 network

route to 209.165.201.1/32 network

A

route to 209.165.201.0/28 network and route to 172.16.0.0/16 network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which QoS tools analyze the traffic and decide which category the packet belongs in?

link-specific tools

policing and shaping tools

congestion management and scheduling tools

classification and marking tools

A

classification and marking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many bits constitute the DSCP field of the IP header?

3 bits

4 bits

6 bits

8 bits

A

6 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which option is a Layer 2 QoS marking?

CoS

DSCP

EXP

QoS group

A

CoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of traffic is smooth and predictable?

voice

video

data

management

A

Voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Imagine that you are the sole network engineer for your company. Suddenly, your users complain that the network is very slow. After further enquiry you found out that there are several users that consume a lot of bandwidth by using torrent/peer-to-peer applications. What are the two use cases that you could use QoS to solve this problem? (Choose two.)

The offending traffic can be throttled to minimal bandwidth.

The offending traffic can be given a higher priority.

All traffic could be treated as equal.

The offending traffic can be dropped.

The business important traffic can be given a lower priority.

A

The offending traffic can be throttled to minimal bandwidth and The offending traffic can be dropped

17
Q

Services are provided to which entities in the DiffServ model?

frames

packets

applications

classes of traffic

A

classes of traffic

18
Q

Which of the basic ISP connectivity types provides the highest redundancy?

single-homed

dual-homed

multihomed

dual-multihomed

19
Q

Which two statement about VPNs are true? (Choose two.)

VPNs do not necessarily implement cryptographic functions.

VPNs can only be established by the use of specialized hardware.

VPNs can be built using the technology used within the service provider WAN.

VPNs are secure because they are established over separate physical connections.

VPNs are only built over internet.

A

VPNs can be built using the technology used within the service provider WAN and VPNs do not necessarily implement cryptographic functions

20
Q

Match each WAN device to its function.

converts digital signals for sending over analog circuits

used in LANs to provide ports that interface to WANs

part of the service provider network and used in “building” a WAN

provides a digital interface for DTE to connect to digital WAN circuits

Options: modem, router, core router and CSU?DSU

A

Converts digital signals for sending over analog circuits → modem

Used in LANs to provide ports that interface to WANs → router

Part of the service provider network and used in “building” a WAN → core router

Provides a digital interface for DTE to connect to digital WAN circuits → CSU/DSU

21
Q

A network administrator configures the border router with the command ip nat inside source list 14 pool accounting. Which ACL is required to be configured in order for this command to function?

An access list named accounting that defines the starting and ending public IPv4 addresses.

An access list named accounting that defines the private addresses that are translated by NAT.

An access list that is numbered 14 that defines the starting and ending public IPv4 addresses.

An access list that is numbered 14 that defines the private addresses that are translated by NAT.

A

An access list that is numbered 14 that defines the private addresses that are translated by NAT.

22
Q

Which three options are advantages of NAT? (Choose three.)

provides consistency for internal network addressing schemes

affects End-to-end functionality

disrupts End-to-end IPv4 traceability

makes tunneling more complicated

increases the flexibility of connections to the public network

conserves public addresses

disrupts TCP connections initiated from the outside

A

Provides consistency for internal network addressing schemes, Increases the flexibility of connections to the public network and Conserves public addresses

23
Q

Where within an enterprise network should classification and marking and policing be performed?

core layer

in end hosts

access layer

distribution layer