Term
____________ forwards frames from source to destination through a virtual path. |
|
Definition
|
|
Term
|
Definition
Permanent Virtual Circuits |
|
|
Term
|
Definition
Switched Virtual Circuits |
|
|
Term
A PVC uses a 10-bit address in the Frame-Relay header called the ___________________. |
|
Definition
Data Link Connection Identifier (DLCI) |
|
|
Term
A ____ is a virtual circuit that is connected permanently and does not need call setup to start transporting data. |
|
Definition
|
|
Term
A _____________ is a temporary virtual circuit connection and is set up only when the user needs to transport data. |
|
Definition
|
|
Term
_____ is a suite of protocols that Frame-Relay uses to exchange information about the state of the connection. |
|
Definition
|
|
Term
|
Definition
Local Management Interface |
|
|
Term
What are the three LMI types supported by Cisco? |
|
Definition
|
|
Term
What LMI type is the default for Cisco Routers? |
|
Definition
|
|
Term
|
Definition
Data Circuit-terminating Equipment |
|
|
Term
|
Definition
Data Terminating Equipment |
|
|
Term
We can check the type of interface (whether it is DTE or DCE) with the help of the _______________ command. |
|
Definition
|
|
Term
What is the first step in configuring Frame-Relay? |
|
Definition
enable Frame-Relay encapsulation on the interface |
|
|
Term
What command enables Frame-Relay encapsulation on an interface? |
|
Definition
Router(config-if)#encapsulation frame relay |
|
|
Term
__________ Mappings rely on Frame-Relay Inverse ARP to resolve the next hop network layer address to a local DLCI value. |
|
Definition
|
|
Term
If we disable Frame-Relay inverse ARP we need to provide a __________ mapping for a particular DLCI to the next-hop IP address. |
|
Definition
|
|
Term
If the line status is down on both sides of the link this refers to a __________ problem. |
|
Definition
|
|
Term
What command will allow us to check for Layer 1 problems on a serial interface? |
|
Definition
show controllers serial interface |
|
|
Term
_________ problems can be due to a mismatch in the encapsulation type, keepalives are disabled, or a CHAP/PAP authentication failure. |
|
Definition
|
|
Term
___________ problems can be due to incorrect IP addressing or that the network is not configured under the routing protocol process. |
|
Definition
|
|
Term
______ are dedicated private virtual links over a service provider network. |
|
Definition
|
|
Term
______ provide the same facility as a point-to-point leased line but with an advantage of lower cost. |
|
Definition
|
|
Term
Why were VPN's developed initially? |
|
Definition
To deal with the security issues of transmitting clear text data across a network |
|
|
Term
____________ is a Cisco proprietary tunneling protocol. It was created by Cisco for virtual private dial-up networks. This type of VPN implements secure connection from the user to the corporate network. |
|
Definition
|
|
Term
_____________ originally was developed by Microsoft to provide a secure remote access solution where traffic needed to be transported from a client, across a public network, to a Microsoft server (VPN gateway). |
|
Definition
Point to Point Tunnelling Protocol |
|
|
Term
______ was designed for wireless networks, but has been incorporated into PPTP. Even though PPP is used in dialup scenarios, PPTP doesn't require the use of dialup to establish remote access connections; you can use dialup or your local LAN connection. |
|
Definition
|
|
Term
____________ is a combination of PPTP and L2F. It is defined in RFCs 2661 and 3438. |
|
Definition
|
|
Term
___________ is also Cisco Proprietary tunneling protocol. It forms virtual point-to-point links thus it allows a wide range of protocols to be encapsulated in IP tunnels. |
|
Definition
Generic Routing Encapsulation |
|
|
Term
________ can be of two types; end user or device. User or remote VPN devices provide information to the network to be accessed. It can use keys or digital certificate or signature. |
|
Definition
|
|
Term
__________ concerns with how user data will be encapsulated and transported over the network. Some VPN implementations will encapsulate only application layer information, whereas others can encapsulate an entire Layer-3 packet or Layer-2 frame. |
|
Definition
|
|
Term
_________ is used to solve eavesdropping issues. It basically takes user data and a key value and runs it through an encryption algorithm, producing what looks like a random string of characters. Only a device with the same key value can decrypt the information. |
|
Definition
|
|
Term
With ____________, a signature is attached to the packet. The signature is created by taking contents from the packet and a shared key and running this information through a hashing function, producing a fixed output, called a digital signature. |
|
Definition
|
|
Term
What are the two ways of configuring keys? |
|
Definition
|
|
Term
_____________ refers to where we can prove that the transaction occurred between two parties on the basic of IP address location and other information stored in the database. |
|
Definition
|
|
Term
Each VPN encapsulation supports different __________ and ___________ so before making a choice we should see the VPN encapsulation and the application compatibility. |
|
Definition
applications and protocols |
|
|
Term
What are the two types of authentication used by PPP? |
|
Definition
|
|
Term
_________ is less secure than CHAP because passwords are sent in clear text. |
|
Definition
|
|
Term
_________ is more secure than PAP and is used during initial link establishment phase. After the link is established, it also checks the link periodically. |
|
Definition
|
|
Term
|
Definition
Protocol Authentication Protocol |
|
|
Term
What does CHAP stand for? |
|
Definition
Challenge Handshake Authentication Protocol |
|
|