CCNA Discovery 4 Chapter 6 Answers

CCNA Exploration 4 Chapter 6 Exam Answers

1.

CCNAExploration5Chapter5ExamAnswers thumb CCNA Exploration 4 Chapter 6 Exam Answers

Refer to the exhibit. A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet. Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and modified? (Choose three.)

The devices must use a dedicated Layer 2 connection.

The devices must have the VPN client software installed.

The two parties must inspect the traffic against the same ACLs.

The two parties must establish a secret key used by encryption and hash algorithms.

The two parties must agree on the encryption algorithm to be used over the VPN tunnel.

The devices must be authenticated before the communication path is considered secure.

 

2.

CCNAExploration5Module5ExamAnswers thumb CCNA Exploration 4 Chapter 6 Exam Answers

Refer to the exhibit. All users have a legitimate purpose and the necessary permissions to access the Corporate network. Based on the topology shown, which locations are able to establish VPN connectivity with the Corporate network?

Locations C, D, and E can support VPN connectivity. Locations A and B require an additional PIX Firewall appliance installed on the edge of the network.

Locations C and E can support VPN connectivity. Locations A, B, and D require an additional PIX Firewall appliance installed on the edge of the network.

Locations A, B, D, and E can support VPN connectivity. Location C requires an additional router on the edge of the network.

All locations can support VPN connectivity.

 

3. While monitoring traffic on a cable network, a technician notes that data is being transmitted at 38 MHz. Which statement describes the situation observed by the technician?

Data is being transmitted from the subscriber to the headend.

Data is flowing downstream.

Cable television transmissions are interfering with voice and data transmissions.

The system is experiencing congestion in the lower frequency ranges.

(more…)

Tags: In the context of implementing VPN tunneling which two protocols are considered encapsulation protocols? (Choose two ), ccna 4 chapter 6, ccna 4 chapter 4, which two data integrity algorithms are commonly used in vpn solutions, In the context of implementing VPN tunneling which two protocols are considered encapsulation protocols?, ccna exploration 4 chapter 6 answers, ccna exploration 2 chapter 6 answers, ccna exploration 4 chapter 6, Which two statements about DSL are true? (Choose two ), Which two methods could an administrator use to authenticate users on a remote access VPN? (Choose two ), Refer to the exhibit A VPN tunnel has been established between the HQ Office and the Branch Office over the public Internet Which three mechanisms are required by the devices on each end of the VPN tunnel to protect the data from being intercepted and mod, ccna exploration chapter 6 answers, CCNA 4 chapter 6 exam answers, Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols? (Choose three ), ccna 4 chapter 6 exam, which two data integrity algorithms are commonly used in vpn solutions?, A company has a remote branch office that uses a cable modem connection to communicate with the main office What type of WAN connection is established at the branch office?, exploration 4 chapter 6, A technician has been asked to configure a broadband connection for a teleworker The technician has been instructed that all uploads and downloads for the connection must use existing phone lines Which broadband technology should be used?, Which statement describes cable?, Data confidentiality through a VPN is achieved through which two methods? (Choose two ), Which two protocols can be used to encapsulate traffic that is traversing a VPN tunnel? (Choose two ), While monitoring traffic on a cable network a technician notes that data is being transmitted at 38 MHz Which statement describes the situation observed by the technician?, After conducting research to learn about common remote connection options for teleworkers a network administrator has decided to implement remote access over broadband to establish VPN connections over the public Internet What is the result of this soluti, What two protocols provide data authentication and integrity for IPsec? (Choose two ), A company is using WiMAX to provide access for teleworkers What home equipment must the company provide at the teleworkers site?, ccna exploration 4 chapter 6 exam, Refer to the exhibit A teleworker is connected over the Internet to the HQ Office What type of secure connection can be established between the teleworker and the HQ Office?, Data confidentiality through a VPN is achieved through which two methods?, ccna exploration chapter 6 exam, ccna vpn, Which two methods could an administrator use to authenticate users on a remote access VPN, n the context of implementing VPN tunneling which two protocols are considered encapsulation protocols? (Choose two ), Which two data integrity algorithms are commonly used in VPN solutions? (Choose two), vpn ccna, n the context of implementing VPN tunneling which two protocols are considered encapsulation protocols?, Which two methods could an administrator use to authenticate users on a remote access VPN?, What are two authentication methods that an access point could use? (Choose two ), Which two statements about DSL are true?, Which statement describes cable, Which two Layer 1 requirements are outlined in the Data-over-Cable Service Interface Specification (DOCSIS)? (Choose two ), Which two statements about DSL are true? (Choose two ) users are on a shared medium uses RF signal transmission local loop can be up to 3 5 miles (5 5km) physical and data link layers are defined by DOCSIS user connections are aggregated at a DSLAM locate, CCNA 4 chapter 6 test answers, from the exhibit a teleworker is connected over the internet to the hq office what type of secure connection can be established between the teleworker and the hq office?, In the context of implementing VPN tunneling which two protocols are considered, A company has a remote branch office that uses a cable modem connection to communicate with the main office What type of WAN connection is established at the branch office, vpn ccna questions, In the context of implementing VPN tunneling, ccna 4 module 6 answers, Data confidentiality through a VPN can be enhanced through the use of which three encryption protocols?