13.1
REVIEW PRT 1
13.2
REVIEW PRT 2
13.3
100

Which protocol is widely used for client device access over VPNs?

SSH

TACACS+

RADIUS

RDP

RADIUS

100

What is the major obstacle to providing WAN access that can approach LAN performance?


Bandwidth in the last mile

The cost of fiber optic cables

The complexity of network protocols

Availability of skilled technicians

Bandwidth in the last mile

100

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database.

Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.

Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.

Which key steps should you take when implementing this configuration? (Select two.)

Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection.

Configure the browser to send HTTPS requests through the VPN connection.

Configure the VPN connection to use MS-CHAPv2.

Configure the VPN connection to use PPTP.

Configure the VPN connection to use IPsec.



Configure the browser to send HTTPS requests through the VPN connection.

Configure the VPN connection to use IPsec.




100

Why is Telnet considered to be insecure?


It uses strong encryption for all communications.

It can only transmit text, not binary files.

It transmits data in plain text.

It automatically blocks access to port 23.

It transmits data in plain text.

100

Which of the following is a popular alternative to Remote Desktop that supports remote access to platforms other than Windows?

TeamViewer

FTP

SMTP

DHCP

TeamViewer

200

What technology do service providers use to support FTTC?


ADSL

LTE

VDSL

WiMAX

VDSL

200

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office to access needed files.

You want the connection to be as secure as possible. Which type of connection do you need?


Direct cable connection

Internet

Intranet

Virtual private network(VPN)


Virtual private network(VPN)

200

During which phase of IKE negotiations is the identity of the two peers established?


Phase I

Phase IV

Phase III

Phase II

Phase I

200

What does the AUX port connect to for remote access?


A digital modem

A fiber optic cable

An analog modem

A wireless router

An analog modem

200

What is the purpose of configuring mutual authentication and access controls for API requests?

To ensure that API requests can only be issued from authorized clients

To slow down the API response times

To increase the system's complexity

To allow unrestricted access to the API

To ensure that API requests can only be issued from authorized clients

300

How is the ONT connected to the customer's router in FTTP?


Using an RJ45 Ethernet patch cord

Using a fiber optic cable

Using a coaxial cable

Using a USB cable

Using an RJ45 Ethernet patch cord

300

What makes TACACS+ different from RADIUS?

TACACS+ is less secure than RADIUS.

TACACS+ uses UDP for communication.

TACACS+ separates AAA functions.

TACACS+ combines AAA in a single process.

TACACS+ separates AAA functions.

300

Which of the following is true about the use of ESP in transport mode?


It encrypts the IP header.

It encrypts only the payload data.

It uses AH for encryption.

It does not provide any integrity check.

It encrypts only the payload data.

300

What is the role of an API in the context of a jump box and automation?

To manually monitor network traffic

To act as a physical firewall

To serve as an interface for automated scripting

To reduce the need for secure connections

To serve as an interface for automated scripting

300

Which of the following best describes the role of Secure Shell (SSH) in out-of-band management?

SSH encrypts the power supply to network devices for enhanced security.

SSH provides a secure method for remote management over the Internet.

SSH is primarily used for wireless device configuration.

SSH is used to physically connect to the console port for initial device setup.

SSH provides a secure method for remote management over the Internet.

400

A rural family is looking for an affordable internet connection option that allows them to browse the web, check emails, and occasionally stream videos. Their area does not have access to cable or fiber optic services.

What would be the MOST suitable type of internet access for them?


T1 Leased Line

Satellite Internet

DSL

4G LTE Mobile Internet

DSL

400

Which protocol is used in conjunction with IPSec to provide added security?


SSTP

PPTP

EAP

L2TP


L2TP

400

Which protocol is known for having too many security flaws to be deployed safely?


IPSec

L2TP

PPTP

SSTP

PPTP

400

What is the primary function of a T-carrier system?


To encrypt data transmissions

To serve as a backup system for internet connections

To provide wireless connectivity

To enable voice traffic digitization


To enable voice traffic digitization

400

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home.

Which protocol should you use?

RDP

SSH

Telnet

FTP

RDP
500

What role does a Cable Modem Termination System (CMTS) play in a cable internet setup?

It converts analog signals to digital.

It serves as a backup connection point.

It routes data traffic via the fiber backbone.

It encrypts data transmissions.

It routes data traffic via the fiber backbone.

500

What is the purpose of a filter (splitter) in a DSL setup?


To increase internet speed

To prevent noise from affecting voice calls

To serve as a backup connection point

To convert digital signals to analog

To prevent noise from affecting voice calls

500

What is the primary purpose of a remote access VPN?

To monitor remote user activities

To secure internet browsing on public networks

To increase the speed of internet connections

To extend local network access over a public network


To extend local network access over a public network

500

At which layer of the OSI model do WANs often use simpler protocols compared to LANs?


Network layer

Transport layer

Data Link layer

Physical layer

Data Link layer

500

What is the purpose of the scp command in SSH?


To securely copy files between hosts

To generate a new SSH key pair

To change the SSH server's configuration

To list files in the remote directory

To securely copy files between hosts