Ccna 4 Chapter 6 V4.0 Answers

Submitted by: Submitted by

Views: 573

Words: 999

Pages: 4

Category: Science and Technology

Date Submitted: 07/17/2012 08:25 AM

Report This Essay

CCNA 4 Chapter 6 V4.0 Answers

1. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)

ATM

CHAP

IPsec

IPX

MPLS

PPTP

 

2. What are the three main functions of a secure VPN? (Choose three.)

accounting

authentication

authorization

data availability

data confidentiality

data integrity

 

3. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)

AES

DES

AH

hash

MPLS

RSA

 

4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?

Data is being transmitted from the subscriber to the headend.

Data is flowing downstream.

Cable television transmissions are interfering with voice and data transmissions.

The system is experiencing congestion in the lower frequency ranges.

 

5. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)

use higher RF frequencies

allocate an additional channel

subdivide the network to reduce users on each segment

reduce the length of the local loop to 5.5 kilometers or less

use filters and splitters at the customer site to separate voice from data traffic

 

6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.)

digital certificates

encryption

encapsulation

hashing

passwords

 

7. What two protocols provide data authentication and integrity for IPsec? (Choose two.)

AH

L2TP

ESP

GRE

PPTP

 

8. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)

digital certificates

ESP

hashing algorithms

smart cards

WPA

 

9. Which is an example of symmetric-key encryption?

Diffie-Hellman

digital certificate

pre-shared key

RSA signature

 

10.

 

Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of...