01. Which two statements about DSL are true? (Choose two.)
- users are on a shared medium
- uses RF signal transmission
- local loop can be up to 3.5 miles (5.5km)
- physical and data link layers are defined by DOCSIS
- user connections are aggregated at a DSLAM located at the CO
02. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)
- channel widths
- access method
- maximum data rate
- modulation techniques
- compression techniques
- use higher RF frequencies
- allocate an additional channel
- subdivide the network to reduce users on each segment
- reduce the length of the local loop to 5.5 kilometers or less
- use filters and splitters at the customer site to separate voice from data traffic
- cable
- DSL
- ISDN
- POTS
- A reliable connection is established at greater speeds than what is offered from dialup over POTS. Security is increased, but username and password information are sent in plain text.
- The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.
- Security and reliability are increased at a substantial loss in throughput, which is considered acceptable when supporting a single user environment.
- Reliability and security are increased without the need for additional equipment, when compared to dialup connections using POTS.
- accounting
- authentication
- authorization
- data availability
- data confidentiality
- data integrity
- digital certificates
- ESP
- hashing algorithms
- smart cards
- WPA
- digital certificates
- encryption
- encapsulation
- hashing
- passwords
- AES
- DES
- AH
- hash
- MPLS
- RSA
- Diffie-Hellman
- digital certificate
- pre-shared key
- RSA signature
- Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range.
- The cable subscriber must purchase a cable modem termination system (CMTS)
- Each cable subscriber has dedicated upstream and downstream bandwidth.
- Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path.
- a WiMAX tower
- a one-way multicast satellite
- a WiMAX receiver
- an access point connected to the company WLAN
- supports municipal wireless networks utilizing mesh technologies
- covers areas as large as 7,500 square kilometers
- supports point-to-point links, but not full mobile cellular-type access
- connects directly to the Internet through high-bandwidth connections
- operates at lower speeds than Wi-Fi, but supports many more users
- Data is being transmitted from the subscriber to the headend.
- Data is flowing downstream.
- Cable television transmissions are interfering with voice and data transmissions.
- The system is experiencing congestion in the lower frequency ranges.
15.Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?
- Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network.
- Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network.
- Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network.
- All locations can support VPN connectivity.
- AH
- L2TP
- ESP
- GRE
- PPTP
- ATM
- CHAP
- IPsec
- IPX
- MPLS
- PPTP
- a GRE tunnel
- a site-to-site VPN
- a remote-access VPN
- the user must be at the office location to establish a secure connection
- The devices must use a dedicated Layer 2 connection.
- The devices must have the VPN client software installed.
- The two parties must inspect the traffic against the same ACLs.
- The two parties must establish a secret key used by encryption and hash algorithms.
- The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
- The devices must be authenticated before the communication path is considered secure.
No comments:
Post a Comment