Which protocol is widely used for client device access over VPNs?
SSH
TACACS+
RADIUS
RDP
RADIUS
What is the major obstacle to providing WAN access that can approach LAN performance?
Bandwidth in the last mile
The cost of fiber optic cables
The complexity of network protocols
Availability of skilled technicians
Bandwidth in the last mile
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database.
Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select two.)
Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection.
Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use MS-CHAPv2.
Configure the VPN connection to use PPTP.
Configure the VPN connection to use IPsec.
Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec.
Why is Telnet considered to be insecure?
It uses strong encryption for all communications.
It can only transmit text, not binary files.
It transmits data in plain text.
It automatically blocks access to port 23.
It transmits data in plain text.
Which of the following is a popular alternative to Remote Desktop that supports remote access to platforms other than Windows?
TeamViewer
FTP
SMTP
DHCP
TeamViewer
What technology do service providers use to support FTTC?
ADSL
LTE
VDSL
WiMAX
VDSL
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office to access needed files.
You want the connection to be as secure as possible. Which type of connection do you need?
Direct cable connection
Internet
Intranet
Virtual private network(VPN)
Virtual private network(VPN)
During which phase of IKE negotiations is the identity of the two peers established?
Phase I
Phase IV
Phase III
Phase II
Phase I
What does the AUX port connect to for remote access?
A digital modem
A fiber optic cable
An analog modem
A wireless router
An analog modem
What is the purpose of configuring mutual authentication and access controls for API requests?
To ensure that API requests can only be issued from authorized clients
To slow down the API response times
To increase the system's complexity
To allow unrestricted access to the API
To ensure that API requests can only be issued from authorized clients
How is the ONT connected to the customer's router in FTTP?
Using an RJ45 Ethernet patch cord
Using a fiber optic cable
Using a coaxial cable
Using a USB cable
Using an RJ45 Ethernet patch cord
What makes TACACS+ different from RADIUS?
TACACS+ is less secure than RADIUS.
TACACS+ uses UDP for communication.
TACACS+ separates AAA functions.
TACACS+ combines AAA in a single process.
TACACS+ separates AAA functions.
Which of the following is true about the use of ESP in transport mode?
It encrypts the IP header.
It encrypts only the payload data.
It uses AH for encryption.
It does not provide any integrity check.
It encrypts only the payload data.
What is the role of an API in the context of a jump box and automation?
To manually monitor network traffic
To act as a physical firewall
To serve as an interface for automated scripting
To reduce the need for secure connections
To serve as an interface for automated scripting
Which of the following best describes the role of Secure Shell (SSH) in out-of-band management?
SSH encrypts the power supply to network devices for enhanced security.
SSH provides a secure method for remote management over the Internet.
SSH is primarily used for wireless device configuration.
SSH is used to physically connect to the console port for initial device setup.
SSH provides a secure method for remote management over the Internet.
A rural family is looking for an affordable internet connection option that allows them to browse the web, check emails, and occasionally stream videos. Their area does not have access to cable or fiber optic services.
What would be the MOST suitable type of internet access for them?
T1 Leased Line
Satellite Internet
DSL
4G LTE Mobile Internet
DSL
Which protocol is used in conjunction with IPSec to provide added security?
SSTP
PPTP
EAP
L2TP
L2TP
Which protocol is known for having too many security flaws to be deployed safely?
IPSec
L2TP
PPTP
SSTP
PPTP
What is the primary function of a T-carrier system?
To encrypt data transmissions
To serve as a backup system for internet connections
To provide wireless connectivity
To enable voice traffic digitization
To enable voice traffic digitization
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home.
Which protocol should you use?
RDP
SSH
Telnet
FTP
What role does a Cable Modem Termination System (CMTS) play in a cable internet setup?
It converts analog signals to digital.
It serves as a backup connection point.
It routes data traffic via the fiber backbone.
It encrypts data transmissions.
It routes data traffic via the fiber backbone.
What is the purpose of a filter (splitter) in a DSL setup?
To increase internet speed
To prevent noise from affecting voice calls
To serve as a backup connection point
To convert digital signals to analog
To prevent noise from affecting voice calls
What is the primary purpose of a remote access VPN?
To monitor remote user activities
To secure internet browsing on public networks
To increase the speed of internet connections
To extend local network access over a public network
To extend local network access over a public network
At which layer of the OSI model do WANs often use simpler protocols compared to LANs?
Network layer
Transport layer
Data Link layer
Physical layer
Data Link layer
What is the purpose of the scp command in SSH?
To securely copy files between hosts
To generate a new SSH key pair
To change the SSH server's configuration
To list files in the remote directory
To securely copy files between hosts