Chapter 13 Flashcards
(20 cards)
Which fiber technology provides the highest possible speed of internet service by eliminating non-fiber connection points?
Question options:
Fiber to the premises
Fiber to the neighborhood
Fiber to the junction
Fiber to the curb
Fiber to the premises
Which of the following correctly describes the T1 carrier system?
Question options:
A single T1 channel can transfer data at 64 Kbps.
T1 lines have a maximum data rate of 2.4 Gbps.
T1 lines use four pairs of copper wire.
T1 lines use 48 separate channels
A single T1 channel can transfer data at 64 Kbps.
Which remote desktop protocol was developed by Microsoft?
Question options:
RDP
SSH
VNC
Unselected
ICA
RDP
Which of the following statements about an SSL VPN are true?
Question options:
Uses UDP port 500.
Encapsulates packets by adding a GRE header.
Provides message integrity using HMAC.
Uses port 443
Uses port 443
Which VPN type allows access to network resources via web browser and does not need dedicated VPN client software?
Question options:
Remote access
Clientless
Site-to-site
Host-to-host
Clientless
Which of the following VPN protocols is no longer considered secure?
Question options:
SSL
PPP
IPsec
TLS
PPP
Which of the following Network layer protocols provides authentication and encryption services for IP-based network traffic?
Question options:
L2TP
IPsec
TCP
SSL
IPsec
You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think that you’ve resolved the problem, but you’d like to be able to manage the server remotely just in case more issues occur.
Which of the following protocols should you use for remote management?
Question options:
L2TP
VNC
PPP
PPTP
VNC
Which of the following describes the lines used in a local loop for dial-up telephone access?
Question options:
SONET
POTS
MPLS
T1
POTS
Which statement BEST describes IPsec when used in tunnel mode?
Question options:
IPsec in tunnel mode may not be used for WAN traffic.
Packets are routed using the original headers, and only the payload is encrypted.
The entire data packet, including headers, is encapsulated.
The identities of the communicating parties are not protected
The entire data packet, including headers, is encapsulated.
In which type of VPN implementation are individual hosts unaware of the VPN?
Question options:
Site-to-site
Remote access
Host-to-host
Clientless
Site-to-site
Which IPSec subprotocol provides data encryption?
Question options:
ESP
AH
SSL
AES
ESP
Which of the following internet services provides equal upload and download bandwidth?
Question options:
VHDSL
SDSL
VDSL
ADSL
SDSL
Which of the following is NOT one of the three types of protocols used by VPNs?
Question options:
Tunneling protocol
Carrier protocol
Encryption protocol
Passenger protocol
Encryption protocol
Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company’s central office?
Question options:
Wireless
Cable modem
DSL
Satellite
DSL
Which of the following services is available regardless of whether the telephone company network is available?
Question options:
Cable modem
Dial-up
DSL
PSTN
Cable modem
Which of the following technologies does GSM use to allow multiple connections on the same frequency?
Question options:
Frequency-division multiple access
Time-division multiple access
Multiple-input, multiple-output
Code-division multiple access
Time-division multiple access
Which port does Remote Desktop use?
Question options:
Port 115
Port 22
Port 3389
Port 23
Port 3389
Which of the following works at layer 3 and can encapsulate an IP packet (or most other Network layer protocol types) as its payload?
Question options:
GRE
SSL
IPsec
PPTP
GRE
Which of the following internet technologies allows for shared bandwidth that can reduce speed during peak times?
Question options:
Cable internet
DSL internet
Fiber
T1 leased lines
Cable internet