Information Technology Reference
In-Depth Information
3.
B. Full-mesh topologies require that each site has a connection to all other sites in the
WA N c l o u d .
4.
B and D. WAN backup over the Internet is best effort and provides redundancy for the
primary WAN connection.
5.
C. Access VPN connections give users connectivity over shared networks such as the
Internet to their corporate intranets.
6.
B, C, and D. Full mesh, partial mesh, and hub and spoke are all WAN topologies used
with Cisco enterprise architectures in the WAN.
7.
B. With peer-to-peer VPNs, the server provider plays an active role in enterprise routing.
8.
B. Service providers can offer shadow PVCs, which provide additional permanent vir-
tual circuits (PVC) for use if needed.
9.
C. A secondary WAN links provide advantages that include backup WAN services and
load sharing.
10. D. Medium branches use dual routers and dual external L2 switches.
11. C. Large branches support between 100 and 1000 users.
12. A and C. IPsec and GRE are methods that exist for tunneling private networks over a
public IP network.
13. C. Factors for WAN architecture selection include ongoing expenses, ease of manage-
ment, and high availability.
14. A. GRE provides simple Layer 3 tunneling for basic IP VPNs without using encryp-
tion.
15. D. Implementing the WAN is not part of the design process.
16. B. ISP service uses Internet-based site-to-site VPNs.
17. C. The shadow PVC uses private WAN Frame Relay services.
18. C. The large branch uses dual router and dual ASA firewalls.
19. B. A private WAN with self-deployed MPLS is usually reserved for large enterprises
that are willing to make substantial investments in equipment and training to build out
the MPLS network.
20. i = A, ii = D, iii = B, iv = C
Chapter 8
“Do I Know This Already?” Quiz
1.
C. IPv4 private addresses are contained within 10.0.0.0/8, 172.16.0.0/12, and
192.168.0.0/16.
2.
B. There are 5 host bits: 2 5 - 2 = 30 hosts.
Search WWH ::




Custom Search