WAN Technology Flashcards Preview

CCNA R&S > WAN Technology > Flashcards

Flashcards in WAN Technology Deck (41)
Loading flashcards...
1

Does not perform data encryption and therefore, information is passed as clear text.

Authentication Header

2

Provides data integrity and authentication, and anti-reply service. It ensures that a packet that crosses the tunnel is the same packet that left the peer device and no changes have been made. It uses a keyed hash to accomplish this.

Authentication Header

3

Can provide data integrity and authentication, but its primary purpose is to encrypt data crossing the tunnel.

Encapsulating Security Payload (ESP)

4

The authentication component does not include any Layer 3 information. Therefore, this component can work in conjunction with a network using NAT.

Encapsulating Security Payload (ESP)

5

On Cisco devices, ESP supports encryption using Advanced Encryption Standard (AES), Data Encryption Standard (DES), or Triple DES (3DES).

Encapsulating Security Payload (ESP)

6

Is used between Virtual Private Network (VPN) gateways such as routers, firewalls, and VPN concentrators.

Tunnel Mode

7

Is used between end-stations or between and end-station and a VPN gateway.

Transport Mode

8

What is the default value in seconds for the dialer idle-timeout seconds command?

120 Seconds

9

Which WAN protocol is used with synchronous and asynchronous connections and defines the frames type and interaction between two devices at the data link layer?

High-Level Data Link Control (HDLC)

10

Which two frame relay encapsulations types are supported on Cisco routers?

Cisco and Internet Engineering Task Force (IETF)

11

Which protocol is responsible for negotiating and maintaining Point-to-Point Protocol (PPP) connections?

Link Control Protocol (LCP)

12

Which encryption algorithm generates a set of keys which includes a public key and a private key?

Asymmetric Encryption

13

Which encryption algorithm generates a set of keys which includes a public key and a private key?

Asymmetric Encryption

14

Which option is used to allow the Frame Relay Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) to exchange status information about the Virtual Circuits and themselves?

Local Management Interface (LMI)

15

What is the default frequency of routers in a frame relay environment to send Inverse Address Resolution Protocol (ARP) messages on active Data Link Connection Identifiers (DLCIs)?

60 seconds

16

What is the asymmetric encryption algorithm?

RSA

17

Which Cisco Internetwork Operating System (IOS) command is used to view the sham-links configured for the provider edge in the VPN backbone?

show ip ospf sham-links

18

Which protocol defines the process of how the two Point-to-Point Protocol (PPP) peers negotiate with network layer protoco0ls, such as IP and IPX?

Network Control Protocol (NCP)

19

Which authentication types can be used for Internet Key Exchange (IKE) peer authentication on Cisco devices?

RSA Signatures and digital certificates, Pre-shared keys, and RSA-encrypted nonces

20

What Cisco Internetwork Operating System (IOS) command would correctly configure a static map of the remote IP address 192.168.144.25 to the local DLCI 401, but not allow broadcasts and multicasts over the virtual circuits (VC)?

the frame-relay map ip 192.168.144.25 401 command.

21

Which protocol works with asynchronous and synchronous serial interfaces as well as High-Speed Serial Interfaces (HSSI0 and Integrated Services Digital Network (ISDN) interfaces (BRI and PRI)?

Point-to-Point Protocol (PPP)

22

Which IOS Command is used to set the maximum amount of interface load before the dialer places another call?

the dialer load-threshold command

23

Which IOS Command is used to set the maximum amount of interface load before the dialer places another call?

the dialer load-threshold command

24

Which cable is used on a router's wide area network (WAN) interface to connect to the serial ports?

Serial Cable

25

Which signatures rely on digital signatures for Internet Key Exchange (IKE) peer authentication?

RSA signatures

26

Which three Local Management Interface (LMI) types are supported on Cisco routers?

ANSI, Cisco, and Q933a

27

Which protocol option should be selected to encrypt and transmit data between peer routers with high confidentiality?

Encapsulating Security Payload (ESP) in tunnel mode

28

Which Dial on Demand Routing (DDR) command allows a sic minute delay before disconnecting a call?

the dialer idle-timeout 360 command

29

Which Dial on Demand Routing (DDR) command allows a sic minute delay before disconnecting a call?

the dialer idle-timeout 360 command

30

By default, how often does a Cisco router serial interface exchange Local Management Interface (LMI) keepalive packets?

every 10 seconds