CCNA4 Chapitre6c
CCNA4 Chapitre6c
Chapitre 6
Powered by LATEX and Le Fakir Avogadro
2 février 2009
1
4. Refer to the exhibit. All users have a legitimate purpose and the neces-
sary persissions to access the Corporate network. Based on the topology
shown, which locations are able to establish VPN connectivity with the
Corporate network ?
5. Refer to the exhibit. A VPN tunnel has been established between the
HQ Office and the Branch Office over the public Internet. Which three
mechanisms are required by the devices on each end of the VPN tunnel
to protect the data from being intercepted and modified ? (Choose three.)
2
(a) The devices must use a dedicated Layer 2 connection.
(b) The devices must have the VPN client software installed.
(c) The two parties must inspect the traffic against the same ACLs.
(d) The two parties must establish a secret key used by encryption and
hash algorithms.
(e) The two parties must agree on the encryption algorithm to be used
over the VPN tunnel.
(f) The devices must be authenticated before the communication path
is considered secure.
3
8. Data confidentiality through a VPN can be enhanced through the use of
which three encryption protocols ? (Choose three.)
(a) AES
(b) DES
(c) AH
(d) hash
(e) MPLS
(f) RSA
(e) operates at lower speeds than Wi-Fi, but supports many more users
11. Which two protocols can be used to encapsulate traffic that is traversing
a VPN tunnel ? (Choose two.)
(a) ATM
(b) CHAP
(c) IPsec
(d) IPX
(e) MPLS
(f) PPTP
12. Which two statements are valid solutions for a cable ISP to reduce conges-
tion for users ? (Choose two.)
4
(a) use higher RF frequencies
(b) allocate an additional channel
(c) subdivide the network to reduce users on each segment
(d) reduce the length of the local loop to 5.5 kilometers or less
(e) use filters and splitters at the customer site to separate voice from
data traffic
13. What two protocols provide data authentication and integrity for IPsec ?
(Choose two.)
(a) AH
(b) L2TP
(c) ESP
(d) GRE
(e) PPTP
15. Which two statements about DSL are true ? (Choose two.)
(a) users are on a shared medium
(b) uses RF signal transmission
(c) local loop can be up to 3.5 miles (5.5km)
(d) physical and data link layers are defined by DOCSIS
(e) user connections are aggregated at a DSLAM located at the CO
16. What are the three main functions of a secure VPN ? (Choose three.)
(a) accounting
(b) authentication
(c) authorization
(d) data availability
5
(e) data confidentiality
(f) data integrity
17. While monitoring traffic on a cable network, a technician notes that data
is being transmitted at 38 MHz. Which statement describes the situation
observed by the technician ?
(a) Data is being transmitted from the subscriber to the headend.
(b) Data is flowing downstream.
(c) Cable television transmissions are interfering with voice and data
transmissions.
(d) The system is experiencing congestion in the lower frequency ranges.
19. Which two Layer 1 requirements are outlined in the Data-over-Cable Ser-
vice Interface Specification (DOCSIS) ? (Choose two.)
(a) channel widths
(b) access method
(c) maximum data rate
(d) modulation techniques
(e) compression techniques