Sharingan - Pinagbabawal na Teknik Questions and Answers PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document contains networking questions and answers, focusing on enterprise edge network modules, PPDIOO design methodology, and security in network infrastructure. It covers topics such as network requirements, existing network characterization, network topology, and various security threats. It includes explanations for several questions and answers related to these topics.
Full Transcript
**Question 7** **Which enterprise edge network modules connect using the PSTN connectivity?** - **Answer**: **Remote-access/VPN** **Question 8** **Which of the following best describes the PPDIOO design methodology? (Select three.)** 1. **Analyze the network requirements** 2. **Characteriz...
**Question 7** **Which enterprise edge network modules connect using the PSTN connectivity?** - **Answer**: **Remote-access/VPN** **Question 8** **Which of the following best describes the PPDIOO design methodology? (Select three.)** 1. **Analyze the network requirements** 2. **Characterize the existing network** 3. **Design the network topology** **Question 9** **Which of the following modules belongs in the enterprise edge?** - **Answer**: **DMZ/e-commerce** **Question 10** **When using PPDIOO design methodology, what should a network designer do after identifying the customer requirements?** - **Answer**: **Characterize the existing network** **Question 11** **How can attackers obtain sensitive account information? (Select three)** 1. **Social engineering** 2. **Password-cracking utilities** 3. **Capturing network traffic** **Question 12** **What technology delivers IP services using labels to forward packets from the source to the destination?** - **Answer**: **MPLS** **Question 13** **Which enterprise edge services/modules connect using Frame Relay and ATM?** - **Answer**: **WAN/MAN** **Question 14** **What does the acronym LWAPP stand for?** - **Answer**: **Lightweight Access Point Protocol** **Question 15** **What type of topology suffers from a single point of failure?** - **Answer**: **Hub-and-spoke topology** **Question 16** **Which of the following should be included in a security policy? (Select three)** 1. **Identification of assets** 2. **Description of permitted behavior** 3. **Definition of roles and responsibilities** **Question 17** **Which security solution best meets requirements for confidentiality, integrity, and authenticity when using the public network such as the Internet?** - **Answer**: **Secure connectivity** **Question 18** **What best describes the difference between a small branch and a medium branch?** - **Answer**: **Small branches use single ASA firewall** - **Medium branches use external L2 switches** **Question 19** **What classification of security threat gathers information about the target without permission?** - **Answer**: **Reconnaissance** **Question 20** **What do service providers use to define their service offerings at different levels?** - **Answer**: **Service Level Agreements (SLAs)** **Question 21** **What two methods are used to enable private networks over public networks?** - **Answer**: **GRE (Generic Routing Encapsulation)** and **IPsec (Internet Protocol Security)** **Question 22** **What functional area provides connectivity between the central site and remote sites?** - **Answer**: **MAN/WAN (Metropolitan Area Network/Wide Area Network)** **Question 23** **What are the four steps used to facilitate continuing efforts in maintaining security policies?** - **Answer**: **Secure, monitor, test, improve** **Question 24** **When designing enterprise branch architecture, which of the following are common network components? (Select three)** 1. **Network management servers** 2. **Routers supporting WAN edge connectivity** 3. **Switches providing the Ethernet LAN infrastructure** **Question 25** **Which of the following is not a recommended approach for designing WANs?** - **Answer**: **Implement new WAN** **Question 26** **What branch design uses ASA firewalls?** - **Answer**: **Small branch** **Question 27** **In the context of wireless local area networks, what does the acronym RAP stand for?** - **Answer**: **Remote Access Point** **Question 28** **Which branch design profile recommends a pair of firewalls?** - **Answer**: **Large branch** **Question 29** **What WAN MAN architecture is provided by the service provider and has excellent growth support and high availability?** - **Answer**: **SP MPLS/IP VPN** **Question 30** **Which of the following are examples of packet- and cell-switched technologies used in the enterprise edge?** - **Answer**: **Frame Relay and ATM** **Question 31** **Which VPN application gives users connectivity over shared networks?** - **Answer**: **Extranet VPN** **Question 32** **Which of the following security legislation applies protection for credit card holder data?** - **Answer**: **PCI DSS (Payment Card Industry Data Security Standard)** **Question 33** **What are components of managing the security infrastructure? (Select three)** 1. **Network access control policy** 2. **Security management policy** 3. **Incident-handling policy** **Question 34** **What are three types of WAN topologies that can be used with Cisco enterprise architecture in the WAN? (Select three)** 1. **Partial-mesh** 2. **Hub-and-spoke** 3. **Full-mesh** **Question 35** **What type of WAN technology provides a dedicated connection from the service provider?** - **Answer**: **Circuit-switched** **Question 37** **What are some physical security guidelines to consider for a secure infrastructure? (Select three)** 1. **Assess the impact of stolen network resources and equipment** 2. **Evaluate potential security breaches** 3. **Use physical access controls such as locks or alarms** **Question 38** **The network access control policy defines the general access control principles used and how data is classified, such as confidential, top secret, or internal.** - **Answer**: **True** **Question 39** **Which security legislative body calls for the protection of people\'s privacy?** - **Answer**: **EU Data Protection Directive** **Question 40** **What does the acronym GLBP stand for?** - **Answer**: **Gateway Load Balancing Protocol** **Question 42** **What two modules are found in the enterprise edge? (Select two)** 1. **Internet** 2. **MAN/WAN** **Question 43** **What are two modules or blocks used in the enterprise edge?** - **Answer**: **Internet connectivity and WAN** **Question 44** **What does the acronym CSMA/CA stand for?** - **Answer**: **Carrier Sense Multiple Access with Collision Avoidance** **Question 49** **SONET/SDH technology is what kind of technology?** - **Answer**: **Circuit based** **Question 50** **How much bandwidth does a T1 circuit provide?** - **Answer**: **1.544 Mbps** **Question 51** **What does the acronym SNMP stand for?** - **Answer**: **Simple Network Management Protocol** For essay part:\ \ Answers:\ \ **business Cost Constraints:** Item 10: A budget of CDN \$25,000 per academic year has been approved for this migration. This represents a budgetary constraint, directly affecting the scope and execution of the network redesign. **Technical Constraints:** Item 4: Redesign the entire network using the Core layer, Distribution layer, and Access layer model as applied in Enterprise networks. Ensure the system's bandwidth accommodates a projected 20% annual growth at all Campuses. This constraint focuses on ensuring that the network architecture can scale effectively to meet future growth. Item 5: Upgrade several server hardware platforms for enhanced performance and fault tolerance as necessary across all Campuses. This addresses the technical constraint of upgrading hardware to ensure optimal performance and reliability. Item 6: Implement an internet firewall to provide security where necessary. The firewall implementation is a critical technical requirement to ensure the network's security. Item 7: Provide a more robust uninterruptible power supply (UPS) system to safeguard key infrastructure equipment and servers against power failures. This addresses the need for continuous power to support critical network infrastructure. Item 8: Provide secure remote login connections for 400 staff members working remotely outside their offices. Select the appropriate technology for this purpose. This technical requirement focuses on ensuring secure remote access for mobile staff. Item 9: Subdivide and isolate corporate network access from classrooms and the internet at Campus-C. This ensures network segmentation for better security and effective traffic management. **Technical Requirements:** Item 3: Plans to implement Voice over IP (VoIP) phone sets at desktop workstations. The vendor or technology has not yet been selected; recommendations for suitable vendors are encouraged in your report. This is a technical requirement for implementing VoIP and selecting a vendor/technology for the solution. **Business Requirements:** Item 1: All Campuses will be WiFi-friendly, and all Campus lab areas will support printer access, enabling printouts from any station to any printer. This requirement aims to improve business operations by providing seamless WiFi and printer access across campuses. Item 2: Users at each campus must have access to the college network through WiFi hotspots within the built-up areas, with access differentiated for "management & staff", "students", and "guests". This business-driven requirement ensures proper network access for different user groups across campuses.