0% found this document useful (0 votes)
74 views

CCNA4 Chapitre6c

This document contains 19 multiple choice questions about remote access technologies like VPNs, WiMAX, DSL, cable, and Wi-Fi. The questions cover topics such as equipment requirements, connection types, security protocols, bandwidth, and functions of these various technologies.

Uploaded by

Sonia Elmejdi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

CCNA4 Chapitre6c

This document contains 19 multiple choice questions about remote access technologies like VPNs, WiMAX, DSL, cable, and Wi-Fi. The questions cover topics such as equipment requirements, connection types, security protocols, bandwidth, and functions of these various technologies.

Uploaded by

Sonia Elmejdi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Sujet d’examen du CCNA 4

Chapitre 6
Powered by LATEX and Le Fakir Avogadro
2 février 2009

1. A company is using WiMAX to provide access for teleworkers. What home


equipment must the company provide at the teleworker’s site ?
(a) a WiMAX tower
(b) a one-way multicast satellite
(c) a WiMAX receiver
(d) an access point connected to the company WLAN

2. After conducting research to learn about common remote connection op-


tions for teleworkers, a network administrator has decided to implement
remote access over broadband to establish VPN connections over the pu-
blic Internet. What is the result of this solution ?
(a) A reliable connection is established at greater speeds than what is
offered from dialup over POTS. Security is increased, but username
and password information are sent in plain text.
(b) The connection has increased security and reliable connectivity. Users
need a remote VPN router or VPN client software.
(c) Security and reliability are increased at a substantial loss in through-
put, which is considered acceptable when supporting a single user
environment.
(d) Reliability and security are increased without the need for additional
equipment, when compared to dialup connections using POTS.

3. A technician has been asked to configure a broadband connection for a


teleworker. The technician has been instructed that all uploads and down-
loads for the connection must use existing phone lines. Which broadband
technology should be used ?
(a) cable
(b) DSL
(c) ISDN
(d) POTS

1
4. Refer to the exhibit. All users have a legitimate purpose and the neces-
sary persissions to access the Corporate network. Based on the topology
shown, which locations are able to establish VPN connectivity with the
Corporate network ?

(a) Locations C, D, and E can support VPN connectivity. Locations A


and B require an additional PIX Firewall appliance installed on the
edge of the network.
(b) Locations C and E can support VPN connectivity. Locations A, B,
and D require an additional PIX Firewall appliance installed on the
edge of the network.
(c) Locations A, B, D, and E can support VPN connectivity. Location
C requires an additional router on the edge of the network.
(d) All locations can support VPN connectivity.

5. Refer to the exhibit. A VPN tunnel has been established between the
HQ Office and the Branch Office over the public Internet. Which three
mechanisms are required by the devices on each end of the VPN tunnel
to protect the data from being intercepted and modified ? (Choose three.)

2
(a) The devices must use a dedicated Layer 2 connection.
(b) The devices must have the VPN client software installed.
(c) The two parties must inspect the traffic against the same ACLs.
(d) The two parties must establish a secret key used by encryption and
hash algorithms.
(e) The two parties must agree on the encryption algorithm to be used
over the VPN tunnel.
(f) The devices must be authenticated before the communication path
is considered secure.

6. Data confidentiality through a VPN is achieved through which two me-


thods ? (Choose two.)
(a) digital certificates
(b) encryption
(c) encapsulation
(d) hashing
(e) passwords

7. Refer to the exhibit. A teleworker is connected over the Internet to the


HQ Office. What type of secure connection can be established between
the teleworker and the HQ Office ?

(a) a GRE tunnel


(b) a site-to-site VPN
(c) a remote-access VPN
(d) the user must be at the office location to establish a secure connection

3
8. Data confidentiality through a VPN can be enhanced through the use of
which three encryption protocols ? (Choose three.)
(a) AES
(b) DES
(c) AH
(d) hash
(e) MPLS
(f) RSA

9. Which two features can be associated with the Worldwide Interoperability


for Microwave Access (WiMAX) telecommunication technology ? (Choose
two.)
(a) supports municipal wireless networks utilizing mesh technologies
(b) covers areas as large as 7,500 square kilometers
(c) supports point-to-point links, but not full mobile cellular-type access
(d) connects directly to the Internet through high-bandwidth connections

(e) operates at lower speeds than Wi-Fi, but supports many more users

10. Which two methods could an administrator use to authenticate users on


a remote access VPN ? (Choose two.)
(a) digital certificates
(b) ESP
(c) hashing algorithms
(d) smart cards
(e) WPA

11. Which two protocols can be used to encapsulate traffic that is traversing
a VPN tunnel ? (Choose two.)
(a) ATM
(b) CHAP
(c) IPsec
(d) IPX
(e) MPLS
(f) PPTP

12. Which two statements are valid solutions for a cable ISP to reduce conges-
tion for users ? (Choose two.)

4
(a) use higher RF frequencies
(b) allocate an additional channel
(c) subdivide the network to reduce users on each segment
(d) reduce the length of the local loop to 5.5 kilometers or less
(e) use filters and splitters at the customer site to separate voice from
data traffic

13. What two protocols provide data authentication and integrity for IPsec ?
(Choose two.)
(a) AH
(b) L2TP
(c) ESP
(d) GRE
(e) PPTP

14. Which statement describes cable ?


(a) Delivering services over a cable network requires downstream fre-
quencies in the 50 to 860 MHz range, and upstream frequencies in
the 5 to 42 MHz range.
(b) The cable subscriber must purchase a cable modem termination sys-
tem (CMTS)
(c) Each cable subscriber has dedicated upstream and downstream band-
width.
(d) Cable subscribers may expect up to 27 Mbps of bandwidth on the
upload path.

15. Which two statements about DSL are true ? (Choose two.)
(a) users are on a shared medium
(b) uses RF signal transmission
(c) local loop can be up to 3.5 miles (5.5km)
(d) physical and data link layers are defined by DOCSIS
(e) user connections are aggregated at a DSLAM located at the CO

16. What are the three main functions of a secure VPN ? (Choose three.)
(a) accounting
(b) authentication
(c) authorization
(d) data availability

5
(e) data confidentiality
(f) data integrity

17. While monitoring traffic on a cable network, a technician notes that data
is being transmitted at 38 MHz. Which statement describes the situation
observed by the technician ?
(a) Data is being transmitted from the subscriber to the headend.
(b) Data is flowing downstream.
(c) Cable television transmissions are interfering with voice and data
transmissions.
(d) The system is experiencing congestion in the lower frequency ranges.

18. Which is an example of symmetric-key encryption ?


(a) Diffie-Hellman
(b) digital certificate
(c) pre-shared key
(d) RSA signature

19. Which two Layer 1 requirements are outlined in the Data-over-Cable Ser-
vice Interface Specification (DOCSIS) ? (Choose two.)
(a) channel widths
(b) access method
(c) maximum data rate
(d) modulation techniques
(e) compression techniques

You might also like