Information Technology Reference
In-Depth Information
11. How many users are supported in a large branch design?
a.
Up to 50
b.
Between 50 to 100
c.
Between 100 to 1000
d.
Between 200 to 5000
12. What two methods are used to enable private networks over public networks?
a.
IPsec
b.
PKI
c.
GRE
d.
PSTN
13. What is not a factor for WAN architecture selection?
a.
Ease of management
b.
Ongoing expenses
c.
Spanning-tree inconsistencies
d.
High availability
14. Which Layer 3 tunneling technique enables basic IP VPNs without encryption?
a.
GRE
b.
IPsec
c.
IPsec
d.
IKE
15. Which of the following is not recommended approach for designing WANs?
a.
Analyze customer requirements
b.
Characterize the existing network
c.
Design the new WAN
d.
Implement new WAN
16. What MAN/WAN architecture uses the Internet with site-to-site VPNs?
a.
Private WAN
b.
ISP service
c.
SP MPLS/IP VPN
d.
Private WAN with self-deployed MPLS
Search WWH ::




Custom Search