1. Which two options describe a WAN? (Choose two.
A WAN is owned and managed by an organization or home user.
A WAN provides networking services over large geographical areas. WAN
services are provided for a fee.
WANs providers offer low bandwidth speeds over short—distances.
WANs guarantee security between the endpoints.
2. Which topology type describes the virtual connection between source to destination?
cabling topology
physical topology
O logical topology
wired topology
3. Which type of WAN network design is the most fault—tolerant?
dual—homed topology
O fully meshed topology
hub—and—spoke topology
partially meshed topology
point—to—point topology
4. Which is a type of WAN carrier connection that provides redundancy?
O dual—carrier WAN connection
single—carrier WAN connection
1. Which two statements about the WAN OSI Layer 1 are true? (Choose two.)
It describes how data will be encapsulated into a frame.
It describes the electrical, mechanical, and operational components needed to transmit bits. It
includes protocols such as PPP, HDLC, and Ethernet.
It includes protocols such as SDH, SONET, and DWDM.
2. Which WAN term demes the point where the subscriber connects to the service providers network.
Customer Premises Equipment (CPE) Data
Communications Equipment (DCE)
Demarcation point
LocalLoop
O Point-of-Presence (POP)
3. Which two devices operate in a similar manner to the voiceband modem but use higher broadband
frequencies and transmission speeds. (Choose two.)
Cable Modem
CSU/DSU
DSL Modem Optical
Converter
Voiceband Modem
4. Which communication method is used in all WAN connections?
Circuit-Switched
Packet-Switched
Parallel
Serial
5. Which two WAN connectivity options are circuit-switched technologies? (Choose two.)
ATM
Ethernet WAN
Frame Relay
ISDN
PSTN
6. Which two WAN connectivity options are packet — switched technologies? (Choose two.)
Ethernet WAN
Frame Relay
ISDN
PSTN
7. Which service provider fiber-optic technology increases the data—carrying capacity using different
wavelengths?
DWDM
SDH
SONET
1. Which traditional WAN connectivity option uses T— Carrier or E—Carrier lines?
ATM
Frame Relay
ISDN
O Leased lines
PSTN
2. Which two traditional WAN connectivity options are circuit—switched? (Choose two.)
ATM
Frame Relay
ISDN
Leased lines
PSTN
3. Which two traditional WAN connectivity options are packet—switched? (Choose two.) ATM
Frame Relay
ISDN
Leased lines
PSTN
1. Which WAN connectivity option is based on Ethernet LAN technology?
ATM
Cable
DSL
O Metro Ethernet MPLS
2. Which is a service provider WAN solution that uses labels to direct the how of packets through the provider
network?
ATM
Cable
DSL
Metro Ethernet
MPLS
1. A companyv is expanding its business to other countries. All branch offices must remain connected to corporate
headquarters at all times. Which network technology is required to support this scenario?
MAN
WAN
WLAN
LAN
2. What is the recommended technology to use over a public WAN infrastructure when a branch office is
connected to the corporate site?
ISDN
VPN
ATM
municipal Wi-Fi
3. Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM?
O fiber optic
Wi-Fi
copper
satellite
4. Which statement describes a characteristic of a WAN?
A WAN provides end-user network connectivity to the campus backbone.
O WAN networks are owned bv service providers.
A WAN operates within the same geographic scope of a LAN, but has serial links. All serial
links are considered WAN connections.
5. Which type of network would be used by a company to connect locations across the country?
SAN
WLAN
LAN
WAN
6. A small company with 10 employees uses a single LAN to share information between computers. Which
type of connection to the Internet would be appropriate for this company?
O a broadband service, such as DSL, through their local service provider private
dedicated lines through their local service provider
Virtual Private Networks that would enable the company to connect easily and securely with emplo vees
a dialup connection that is supplied by their local telephone service provider
7. To which two layers of the OSI model do WAN technologies provide services? (Choose two.) transport
laver
data link layer
session layer
presentation layer
network layer
physical layer
8. A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth
between two sites. Which type of WAN connection would best fulfill this need?
Ethernet WAN
circuit-switched network
MPLS
packet-switched network
9. An intercity bus company wants to offer constant Internet connectivity to the users traveling on the buses Which two
types of WAN infrastructure would meet the requirements? (Choose two.)
public infrastructure
cellular
private infrastructure
dedicated
circuit-switched
10. An enterprise has four branches. The headquarters needs full connectivity to all branches. The branches do not need
to be connected directly to each other. Which WAN topology is most suitable?
point-to-point
full mesh mesh
bus
O hub and spoke
11. What is a characteristic of a WAN?
WANs always use physical cables to connect LANs.
A WAN operates inside the geographic scope of a LAN.
A WAN is typicaI!v wned bv an enterprise which wants to interconnect its LANs.
O WAN service providers include carriers such as a telephone network or satellite service.
12. What are two common types of circuit-switched WAN technologies? (Choose two.)
ATM
ISDN
Frame Relay
DSL
PSTN
13. A new corporation needs a data network that must meet certain requirements. The network must provide a low cost
connection to sales people dispersed over a large geographical area. Which two types of WAN infrastructure would
meet the requirements? (Choose two.)
dedicated
satellite
Internet
public infrastructure private
infrastructure
1. Which VPN benefit allows an enterprise to easily add more users to the network?
Cost Savings
Security
O Scalability
Compatibility
2. Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding
more equipment or WAN links?
Cost Savings
Security
Scalability
Compatibility
3 Which VPN benefit uses advanced encryption and authentication protocols to protect data from
unauthorized access?
Cost Savings
Security
Scalability
Compatibility
4. Which type of VPN is used to connect a mobile user?
Site-to-site
O Remote-access GRE
IPsec
5 Which VPN solutions are typically managed by an enterprise? (Choose three)
MPLS Layer 2
MPLS Layer 3
IPsec
SSL
Frame Relay DMVPN
1. What type of VPN can be established with a web browser using HTTPS?
IPsec
Client-based VPN
Site-to-Site VPN
O Clientless VPN
2. Which feature describes SSL VPNs?
All IP-based applications are supported O
Only requires a web browser on a host
Specific devices with specific configurations can connect
Uses two-way authentication with shared keys or digital certificates
3. What type of protocol is GRE?
Security protocol
Passenger protocol Carrier
protocol Transport
protocol
4. What type of VPN enables an enterprise to rapidly scale secure access across the organization?
DMVPN
Remote-access VPN
Site-to-Site VPN MPLS
VPN
5. What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?
DMVPN
Remote-access VPN
Site-to-Site VPN MPLS
VPN
1. IPsec can protect traffic in which OSI layers? (Choose four.)
Layer
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
2. Which IPsec function uses pre—shared passwords, digital certificates, or RSA certificates?
IPsec protocol
Confidentiality
lingerie
O Authentication
Dither—Hell man
3. True or False: The IPsec framework must be updated each time a new standard is developed.
True
O False
4. Which choices are packet encapsulation options suported by IPsec? (Choose two.) AES
AH
DH24
ESP
PSK
RSA
SHA
5. Which choices provide for the Confidentiality function in the IPsec framework? (Choose three.)
3DES
AES
AH
DH24
PSK
SEAL
SHA
6. Which choices provide for the Integrity function in the IPsec framework? (Choose two.)
AES
AH
DH24
MD5
PSK
SEAL
SHA
7. Which choices are available for the Authentication function in the IPsec framework? (Choose two.)
AES
AH
DH24
PSK
RSA
SEAL
SHA
8. Which Diffie—Hellman group choices are no longer recommended?
PDH groups1,2,and 5
DH groups 14, 15,and 16
DH groups 19,20,21 and 24
1. Which two statements describe a remote access VPN? (Choose two.)
It requires hosts to send TCP/IP traffic through a VPN gateway. It
connects entire networks to each other.
It may require VPN client software on hosts.
It is used to connect individual hosts securely to a company network over the Internet. It
requires static configuration of the VPN tunnel.
2. The use of 3DES within the lPsec framework is an example of which of the five lPsec building blocks?
integrity
authentication
Diffie—Hellman
O confidentiality
nonrepudiation
3. Which type of VPN may require the Cisco VPN Client software?
SSL VPN
site—to-site VPN
O remote access VPN
MPLS VPN
4. Which technique is necessary to ensure a private transfer of data using a VPN?
scalability
encryption
virtualization
authorization
5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)
client-to-site
spoke—to-spoke
hub—to-spoke
server-to—client
site—to-site
6. What are two reasons a company would use a VPN? (Choose two.)
to allow suppliers to access the
network to connect remote users to
the network to increase bandwidth to
the network
to test network connections to remote
users to eliminate the need of having a
gateway
7. True or False?
All VPNs securely transmit clear text across the Internet.
false
vue
8. Which solution allows workers to telecommute effectively and securely?
O remote—access VPN
DSL connection
dial — up connection
site—to—site VPN
9. Which VPN type is a service provider managed VPN?
site—to—site VPN
remote access VPN
O Layer 3 MPLS VPN
GRE over IPsec VPN
10. Which IPsec framework protocol provides data integrity and data authentication, but does not
provide data confidentiality?
IP protocol 50
AH
ESP
DH
11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?
RSA AES
HMAC
DH
12. Which statement describes the effect of key length in deterring an attacker from hacking through an
encryption key?
The length of a kev does not affect the degree of securityv
The longer the kev, the more key possibilities exist.
The length of a kev will not vary between encryption algorithms. The
shorter the kev, the harder it is to break.
13. What is a type of VPN that is generally transparent to the end user?
public
remote access
site-to-site
private
1. What is the varia ble amount of time it takes for a frame to traverse the links between the source and
destination?
serialization delay
O propagation delay
code delay
2. What happens when congestion occurs?
O packet loss
jitter
code delay
3. What is the fixed amount of time it takes to transmit a frame from the NIC to the wire?
O serialization delay
jitter
code delay
4. What is caused by variation in delay?
congesflon
packet loss
jitter
1. Which type of traffic tends to consume a large portion of network capacity?
voice
video
data
2. Which type of traffic requires at least 384 Kbs of bandwidth?
voice
video
data
3. Which type of traffic is unpredictable, inconsistent, and bursty?
voice
video
data
4. Which type of traffic can be predictable and smooth?
voice
video
data
5. Which type of traffic cannot be retransmitted if lost?
voice
video
data
6. Which type of traffic must receive a higher UDP priority?
voice
video
data
1. Which queuing algorithm simultaneously sc hedules interactive traffic to the front of a queue 1o reduce
response time?
FIFO
WFQ
CBVVFQ
LLQ
2. Which queuing algorithm provides support for user-defined traffic c asses?
FIFO
\n/FQ
CBWFQ
LLQ
3. Which queuing algorithm is effective for large links that have little delay and minimal congestion?
FIFO
WFQ
CBWFQ
LLQ
4. Which queuing algorithm classifies traffic into different flows based on packet header addressing?
FIFO
WFQ
CBVV*O
LLQ
5. Which queuing algorithm allows delay—sensitive data such as voice to be sent before packets in other queues?
FIFO
\n/FQ
CB\n/ >Q
@ LLQ
6. Which queuing algorithm applies priority, or weights, to identify traffic and classify it?
FIFO
WFQ
CBW*Q
LLQ
1. Which QoS model provides per-request policy admission control?
best effort
O integrated services differential
services
2. Which QoS model requires no special QoS mechanisms?
best effort
integrated services
differential services
3. Which QoS model provides many different levels of quality?
best effort
integrated services
differential services
4. Which QoS model uses explicit end-to-end resource admission control? best
effort
O integrated services differential
services
5. Which QoS model is the most scalable?
best effort
integrated services
differential services
1. Which detects when traffic rates reach a configured maximum rate and drops excess traffic?
traffic policing
traffic shaping
classification
2. Which determines what c lass of traffic packets or frames belong to.
marking
classification
traffic shaping
3. Which adds a value to the packet header?
O• marking
classification
802.1Q
4. Which provides buffer management and allows TCP traffic to throttle back before buffers are exhausted? traffic
policing
802.1Q
O• WRED
5. Which retains excess packets in a queue and then schedules the excess for later transmission over
increments of time?
WRED
traffic policing
O traffic shaping
1. What is the term used to indicate a variation of delay?
latency
speed mismatch
serialization delay
jitter
2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from
a source to a destination device and return. Which term describes the value?
jitter
priority
bandwidth
latency
3. What role do network devices play in the IntServ QoS model?
Network devices use QoS on a hop- bv- hop basis to provide excellent scalabil ‹v Network
devices provide a best-effort approach to forwarding trafhc.
O Network devices ensure that resources are available before traffic is allowed to be sent by a host through the
network.
Network devices are configured to service multiple classes of trafhc and handle trafhc as it may arrive.
4. Which device would be classified as a trusted endpoint? switch
router
O IP phone firewall
5. Under which condition does congestion occur on a converged network with voice, video, and data traffic?
O if the request for bandwidth exceeds the amount of bandwidth available
if a user downloads a file that exceeds the file limitation that is set on the server if
video trafhc requests more bandwidth than voice trafhc requests
if voice traffic latency begins to decrease across the network
6. Which type of traffic does Cisco recommend be placed in the strict priority queue (PC) when low latency queuing
(LLQ) is being used?
voice
video
management
data
7. Which model is the only QoS model with no mechanism to classify packets?
O best-effort
DiffServ
IntServ
hard €}oS
8. What happens when the memory queue of a device fills up and new network traffic is received?
The network device drops all trafhc in the queue. The
network device will drop the arriving packets.
The network device sends the received trafhc immediately.
The network device queues the received traffic while sending previously received traffic.
9. What are two characteristics of voice traffic? (Choose two.) It is
bursty.
It can tolerate latency up to 400 ms.
It is delav sensitive.
It consumes few network resources.
It is insensitive to packet loss.
10. Which QoS model is very resource intensive and provides the highest guarantee of QoS? best-effort
IntServ
DiffServ
soft QoS
11. What happens when an edge router using lntserv QoS determines that the data pathway cannot support the level of
QoS requested?
Data is forwarded along the pathway using IntServ but not provided preferential treatment. Data is
forwarded along the pathway using DiffServ.
O Data is not forwarded along the pathway.
Data is forwarded along the pathway using a best-effort approach.
12. In QoS models, which type of traffic is commonly provided the most preferential treatment over all other
application traffic?
email
lie transfers
web traffic
voice traffic
13. Which queuing mechanism supports user-defined traffic classes?
CBWFQ
FCFS
FIFO
WFQ
14. What mechanism compensates for jitter in an audio stream bv buffering packets and then replaying them outbound
in a steady stream?
WFQ
voice codec
digital signal processor O
playout delay buffer