You are on page 1of 4

1. Which of the following is not a common Wide Area Network connection types?

a. Dedicated Circuit Switched c. Packet Switched Virtual Circuit

b. Point to Point Packet Radio d. Broadband Access

2. Which of the following criteria is a valid consideration when selecting a Wide Area Network Connection type?

a. Software accessibility c. Upgrading Cost

b. Access Control d. Usability

3. Which of the following ports not a common approach for connecting an external modem to a the router

a. Auxiliary c. Console

b. Serial interface d. Fast Ethernet

4. Which of the following correctly specify the transmission speed of a V.32 Turbo class modem?

a. 14400bps c. 19200bps

b. 28800bps d. 33600bps

5. Which of the following Open Systems Interconnection layers does the Point-to-Point architecture come under?

a. Layer 2 c. Layer 1

b. Layer 3 d. Layer 4

6. Which of the following algorithms is used by the Challenge Handshake Authentication Protocol in order to determine a
successful Point-to-Point connection?

a. RSA c. RC6

b. Message Digest 5 d. Data Encryption Standard

7. Which of the following protocol series define the concepts, terminology, and general methods of the Integrated Services
Digital Network?

a. E c. Q

b. I d. R
8. Which of the following elements is not an element of a dialer profile?

a. Physical interfaces c. Map class

b. Dialer pool d. Dial backup

9. Which of the following statements correctly states the problem with legacy Dial-on-Deman routing?

a. The physical interfaces are not locked into permanent configurations.

b. The physical interfaces are statistically tied to only one configuration.

c. This mechanism assumes call parameters on an as-needed basis.

d. When the call is finished, the interfaces are freed of the previous logical configuration.

10. Which of the following components is not part of the Frame Relay connection?

a. Data Terminal Equipment

b. Data Circuit-terminating Equipment

c. Concentrator

d. Customer Premise Equipment

11. Which of the following types of topologies is most commonly supported by Frame Relay?

a. Tree c. Star

b. Ring d. Bus

12. Which of the following terminologies belonging to the Frame Relay traffic refers to "The rate is usually averaged over a
period of time, referred to as the committed time window"?

a. Committed information rate c. Forward explicit congestion notification

b. Local access rate d. Excess burst

13. Which of the following show traffic shape command fields shows the number of bytes that are sustained per internal interval?

a. Target rate c. Adapt Active

b. Sustain bits/interval d. Increment (Bytes)


14. Which of the following queuing options a network administrator can choose in order queue traffic based on traffic classes
access control lists (ACLs), and applies parameters such as bandwidth and queue limits?

a. WeightedFair Queuing

b. Class Based Weighted Fair Queuing

c. Low Latency Queuing

d. Priority Queue

15. Which of the following components is not part of the Cisco secure access control solutions?

a. User database

b. Authentication, Authorization and Accounting clients

c. Authentication, Authorization and Accounting network

d. Authentication, Authorization and Accounting server

16. Which of the following pairs correctly state the router access modes for Authentication, Authorization and Accounting
(AAA)?

a. Character and Packet c. Packet and Bytes

b. Cell and Packet d. Frame and Character

17. Which of the following statements correctly states the disadvantage of using Cable modems for remote access broadband
service?

a. Connection speed are stable during busy periods even without quality of service mechanisms

b. Minimum committed information rate are guaranteed to all customers

c. Customers need to dial in to the internet every time

d. Bandwidth is shared among all of the data users in a given area

18. Which of the following terms is not a valid Digital Subscriber Line technology?

a. High Digital Subscriber Line

b. Dynamic Digital Subscriber Line

c. Very high data rare Digital Subscriber Line

d. Integrated Services Digital Subscriber Line


19. Which of the following topologies does not support networked Virtual Private Network tunnels to carry encrypted data?

a. From one router to many other routers

b. From personal computer to router or virtual private network concentrator

c. From modem to firewall

d. Router to firewall and personal computer to firewall

20. Which of the following encryption technologies is classified as asymmetric approach?

a. RSA

b. Data Encryption Standard

c. Advanced Data Encryption Standard

d. Triple Data Encryption Standard

You might also like