Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

WAN Final Test

Enter the letter for the matching Answer
incorrect
1.
Which solutions can be implemented with ACLs? (Choose two.)
incorrect
2.
Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?
incorrect
3.
Which statement about standard ACLs is true?
incorrect
4.
What are two characteristics of a PPPoE configuration on a Cisccustomer router? (Choose two.)
incorrect
5.
Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
incorrect
6.
When comparing DOCSIS and Euro-DOCSIS, what is the primary difference between the two specs?
incorrect
7.
If an admin chooses to avoid using NAT overload, what is the default timeout value for NAT translations?
incorrect
8.
Which NAT solution allows external users to access an internal FTP server on a private net?
incorrect
9.
Which three items must be configured before a dynamic ACL can become active on a router? (Choose three.)
incorrect
10.
What is associated with the first step of correcting application layer problems?
incorrect
11.
Why is the MTU for a PPPoE DSL configuration reduced from 1500 bytes to 1492?
incorrect
12.
A technician is creating an ACL and needs a way to indicate only the subnet 172.16.16.0/21. Which combination of network address and wildcard mask will accomplish the desired task?
incorrect
13.
Which wireless std operates in both licensed and unlicensed bands of the spectrum from 2 to 6 GHz and allows for tx rates of 70 Mbps at a range of up to 50 km?
incorrect
14.
Which feature will require the use of a named ACL rather than a numbered ACL?
incorrect
15.
Which NAT characteristic can map multiple addresses to a single address of the external interface?
incorrect
16.
Which statement is true about network models?
incorrect
17.
Which ACL uses access list numbers 100 to 199
incorrect
18.
An admin wants to implement lock-and-key access to a host within the company net for specific users who are connecting from outside the company network. What type of ACL would best suit the situation?
incorrect
19.
Cmd: show access-list
incorrect
20.
A net admin receives the output "S0 is ip, line protocol is down" from the show int s0 cmd. At what layer is the problem most likely being caused?
A.
Static NAT
B.
They should be placed as close to the destination as possible.
C.
NAT with Overload
D.
Both users and app layer processes interact with software apps that contain a communications component in the OSI model.
E.
Extended
F.
Data link layer.
G.
802.16
H.
1. Create a firewall on a rtr to filter inbound tfc from an external net. 2. Ctrl tfc entering or exiting different areas on a local net.
I.
Dynamic
J.
1. The PPP configuration is on the dialer interface. 2. The Ethernet interface does not have an IP address.
K.
1. information about the network design 2. expected performance under normal operating conditions
L.
One day.
M.
172.16.16.0 0.0.7.255
N.
Description: Displays the contents of all ACLs on a rtr.
O.
Channel bandwidths
P.
Making a backup of configurations.
Q.
To accommodate the PPPoE headers
R.
the ability to edit the ACL and add additional statements in the middle of the list without removing and re-creating the list
S.
1. extended ACL 2. authentication 3. Telnet connectivity
T.
physical
Type the Answer that corresponds to the displayed Question.
incorrect
21.
Which NAT characteristic assigns unique source port numbers of an inside global address on a session-by-session basis?
incorrect
22.
Which algorithm has encryption and decryption use different keys?
incorrect
23.
Which type of tunneling protocol is the protocol that is wrapped around the original data?
incorrect
24.
Which algorithm uses DES, 3DES and AES?
incorrect
25.
Which ACL checks source and destination address
incorrect
26.
“???” creates a PPP tunnel through the DSL connection for the purpose of sending PPP frames.
incorrect
27.
Which medium is used for delivering data via DSL technology through PSTN?
incorrect
28.
Which algorithm uses public key cryptography?
incorrect
29.
Which ACL permits/denies only entire protocols based on network address
incorrect
30.
Which algorithm uses shared secret key cryptography?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: evilfrosty
Popular Computers sets