Documente Academic
Documente Profesional
Documente Cultură
1 Which two statements are reasons why UDP is used for voice and video traffic instead of TCP? (Choose two.)
TCP requires all data packets to be delivered for the data to be usable.
The acknowledgment process of TCP introduces delays that break the streams of data.
TCP requires less processing by the source and destination hosts than UDP.
UDP introduces delays that degrade the quality of the data applications.
TCP ensures fast delivery because it does not require sequencing or acknowledgements.
NAT
user authentication
packet sniffing
divide the network into functional components while still maintaining the concept of Core, Distribution, and Access Layers
provide services and functionality to the core layer by grouping various components into a single component located in the
layer
reduce overall network traffic by grouping server farms, the management server, corporate intranet, and e-commerce rout
same layer
enterprise edge
It limits access to corporate information to secure VPN or remote access connections only.
It allows customers and partners to access company information by connecting to a public web server.
It allows suppliers and contractors to access confidential internal information using controlled external connections.
• 1.3.1 Teleworking
8 Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers?
enterprise campus
enterprise edge
building distribution
This item references content from the following areas:
CCNA Discovery: Introducing Routing and Switching in the Enterprise
using a VPN from home to send data to the main office servers
providing intrusion detection and intrusion prevention to protect the network against malicious activity
providing packet inspection to determine if incoming packets should be allowed on the enterprise network
enterprise edge
enterprise campus
SSH
Telnet
FTP
VPN
HTTP
Telnet
• 1.3.1 Teleworking
17 How does a VPN work to support remote user productivity?
It uses SSL to encrypt remote user logins to the corporate intranet.
It uses secure Telnet for remote user connections to internal network devices.
It creates a virtual circuit that allows real-time communications between any two Internet endpoints.
It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks.
system updates
company e-mail
transaction processing
bandwidth optimization
source IP address
• 1.3.1 Teleworking
24 Which protocol and process could be implemented on a network to ensure that a telecommuter can attend a training presentati
use of VoIP and still experience uninterrupted data streams and quality conversations?
TCP and QoS