Skip to main content

CCNA v4 - E4 - Module 6 (100%)

1. Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two.)

  channel widths
  modulation techniques

2. Which is an example of symmetric-key encryption?

  pre-shared key

3. Which two statements are valid solutions for a cable ISP to reduce congestion for users? (Choose two.)

  allocate an additional channel
  subdivide the network to reduce users on each segment

4. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?

  Data is being transmitted from the subscriber to the headend.

5. After conducting research to learn about common remote connection options for teleworkers, a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet. What is the result of this solution?

  The connection has increased security and reliable connectivity. Users need a remote VPN router or VPN client software.

6. Data confidentiality through a VPN is achieved through which two methods? (Choose two.)

  encryption
  encapsulation

7. Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three.)
  AES
  DES
  RSA

8. What two protocols provide data authentication and integrity for IPsec? (Choose two.)
  AH
  ESP

9. A technician has been asked to configure a broadband connection for a teleworker. The technician has been instructed that all uploads and downloads for the connection must use existing phone lines. Which broadband technology should be used?

  DSL

10. What are the three main functions of a secure VPN? (Choose three.)

  authentication
  data confidentiality
  data integrity

11. A company is using WiMAX to provide access for teleworkers. What home equipment must the company provide at the teleworker's site?

  a WiMAX receiver

12. Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two.)
  digital certificates
  smart cards

13. Which two statements about DSL are true? (Choose two.)

  local loop can be up to 3.5 miles (5.5km)
  user connections are aggregated at a DSLAM located at the CO

14. Which two features can be associated with the Worldwide Interoperability for Microwave Access (WiMAX) telecommunication technology? (Choose two.)

  covers areas as large as 7,500 square kilometers
  connects directly to the Internet through high-bandwidth connections

15. Refer to the exhibit. All users have a legitimate purpose and the necessary persissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?

  All locations can support VPN connectivity.

16. Which statement describes cable?

  Delivering services over a cable network requires downstream frequencies in the 50 to 860 MHz range, and upstream frequencies in the 5 to 42 MHz range.

17. Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two.)

  IPsec
  PPTP

18. Refer to the exhibit. A teleworker is connected over the Internet to the HQ Office. What type of secure connection can be established between the teleworker and the HQ Office?

  a remote-access VPN

19. Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.)

  The two parties must establish a secret key used by encryption and hash algorithms.
  The two parties must agree on the encryption algorithm to be used over the VPN tunnel.
  The devices must be authenticated before the communication path is considered secure.

Comments

Popular posts from this blog

[韓日関係] 首相含む大幅な内閣改造の可能性…早ければ来月10日ごろ=韓国

div not scrolling properly with slimScroll plugin

I am using the slimScroll plugin for jQuery by Piotr Rochala Which is a great plugin for nice scrollbars on most browsers but I am stuck because I am using it for a chat box and whenever the user appends new text to the boxit does scroll using the .scrollTop() method however the plugin's scrollbar doesnt scroll with it and when the user wants to look though the chat history it will start scrolling from near the top. I have made a quick demo of my situation http://jsfiddle.net/DY9CT/2/ Does anyone know how to solve this problem?

Why does this javascript based printing cause Safari to refresh the page?

The page I am working on has a javascript function executed to print parts of the page. For some reason, printing in Safari, causes the window to somehow update. I say somehow, because it does not really refresh as in reload the page, but rather it starts the "rendering" of the page from start, i.e. scroll to top, flash animations start from 0, and so forth. The effect is reproduced by this fiddle: http://jsfiddle.net/fYmnB/ Clicking the print button and finishing or cancelling a print in Safari causes the screen to "go white" for a sec, which in my real website manifests itself as something "like" a reload. While running print button with, let's say, Firefox, just opens and closes the print dialogue without affecting the fiddle page in any way. Is there something with my way of calling the browsers print method that causes this, or how can it be explained - and preferably, avoided? P.S.: On my real site the same occurs with Chrome. In the ex