module 6 (1130929)
Текст из файла
http://ccna-4.blogspot.com1Which two statements about DSL are true? (Choose two.)users are on a shared mediumuses RF signal transmissionlocal loop can be up to 3.5 miles (5.5km)physical and data link layers are defined by DOCSISuser connections are aggregated at a DSLAM located at the CO2What are the three main functions of a secure VPN? (Choose three.)accountingauthenticationauthorizationdata availabilitydata confidentialitydata integrity3Refer to the exhibit. All users have a legitimate purpose and the necessary persissions to access the Corpnetwork.
Based on the topology shown, which locations are able to establish VPN connectivity with theCorporate network?Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Fappliance installed on the edge of the network.Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Fappliance installed on the edge of the network.Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router onedge of the network.All locations can support VPN connectivity.4Data confidentiality through a VPN is achieved through which two methods? (Choose two.)digital certificatesencryptionencapsulationhashingpasswords5After conducting research to learn about common remote connection options for teleworkers, a networkadministrator has decided to implement remote access over broadband to establish VPN connections ovepublic Internet.
What is the result of this solution?A reliable connection is established at greater speeds than what is offered from dialup over POTS. Seis increased, but username and password information are sent in plain text.The connection has increased security and reliable connectivity.
Users need a remote VPN router orclient software.Security and reliability are increased at a substantial loss in throughput, which is considered acceptabwhen supporting a single user environment.Reliability and security are increased without the need for additional equipment, when compared to dconnections using POTS.6What two protocols provide data authentication and integrity for IPsec? (Choose two.)AHL2TPESPGREPPTP7A network administrator needs a secure connection between a remote site and the company HQ site. Whthree protocols could the administrator use to connect the two sites? (Choose three.)Diffie-HellmanGREL2TPPPTPWPA2802.1x8Which is an example of symmetric-key encryption?Diffie-Hellmandigital certificatepre-shared keyRSA signature9Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose tdigital certificatesESPhashing algorithmssmart cardsWPA10While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHzWhich statement describes the situation observed by the technician?Data is being transmitted from the subscriber to the headend.Data is flowing downstream.Cable television transmissions are interfering with voice and data transmissions.The system is experiencing congestion in the lower frequency ranges.11Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)use higher RF frequenciesallocate an additional channelsubdivide the network to reduce users on each segmentreduce the length of the local loop to 5.5 kilometers or lessuse filters and splitters at the customer site to separate voice from data traffic12Which statement describes cable?Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz raand upstream frequencies in the 5 to 42 MHz range.The cable subscriber must purchase a cable modem termination system (CMTS)Each cable subscriber has dedicated upstream and downstream bandwidth.Cable subscribers may expect up to 27 Mbps of bandwidth on the upload path.13Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMtelecommunication technology? (Choose two.)supports municipal wireless networks utilizing mesh technologiescovers areas as large as 7,500 square kilometerssupports point-to-point links, but not full mobile cellular-type accessconnects directly to the Internet through high-bandwidth connectionsoperates at lower speeds than Wi-Fi, but supports many more users14A technician has been asked to configure a broadband connection for a teleworker.
The technician has binstructed that all uploads and downloads for the connection must use existing phone lines. Which broatechnology should be used?cableDSLISDNPOTS15Data confidentiality through a VPN can be enhanced through the use of which three encryption protoco(Choose three.)AESDESAHhashMPLSRSA16A company is using WiMAX to provide access for teleworkers.
What home equipment must the compaprovide at the teleworker's site?a WiMAX towera one-way multicast satellitea WiMAX receiveran access point connected to the company WLAN17Which two statements accurately describe VPN connectivity? (Choose two.)Remote access VPNs provide remote users access to an internal network over a shared infrastructuVPN client software.Remote access VPNs provide remote users access to an internal network over a shared infrastructuVPN client software. The connection requires a VPN router or PIX appliance.Advanced encryption techniques and tunneling that are required to establish secure, end-to-end, prinetwork connections over third-party networks are unnecessary when remote access VPNs are usedSite-to-site VPNs link headquarters, remote offices, and branch offices to an internal network overshared infrastructure using dedicated connections.
The connection requires VPN client software.Site-to-site VPNs link headquarters, remote offices, and branch offices to an internal network overshared infrastructure using dedicated connections. The connection requires a VPN router or PIX apAdvanced encryption techniques and tunneling, which are required to establish secure, end-to-end,network connections over third-party networks, are unnecessary when site-to-site VPNs are used.18 Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DO(Choose two.)channel widthsaccess methodmaximum data ratemodulation techniquescompression techniques.
Характеристики
Тип файла PDF
PDF-формат наиболее широко используется для просмотра любого типа файлов на любом устройстве. В него можно сохранить документ, таблицы, презентацию, текст, чертежи, вычисления, графики и всё остальное, что можно показать на экране любого устройства. Именно его лучше всего использовать для печати.
Например, если Вам нужно распечатать чертёж из автокада, Вы сохраните чертёж на флешку, но будет ли автокад в пункте печати? А если будет, то нужная версия с нужными библиотеками? Именно для этого и нужен формат PDF - в нём точно будет показано верно вне зависимости от того, в какой программе создали PDF-файл и есть ли нужная программа для его просмотра.















