Q31. DRAG DROP
Match the VPN connection type to the corresponding definition.
To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q32. A router's static route is set by the:
A. Adjacent network
B. Next upstream router
C. Network administrator
D. Routing protocol
Answer: C
Q33. This question requires that you evaluate the underlined text to determine if it is correct.
IPSec policies for two machines on a LAN can be modified by using the IPSec policy snap-in on Windows 7.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Windows Firewall with Advanced Security snap-in
B. LAN adapter properties
C. Remote Access snap-in
D. No change is needed
Answer: A
Q34. DRAG DROP
Match each protocol to its description.
To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q35. One purpose of a perimeter network is to:
A. Make resources available to the intranet.
B. Link campus area networks (CANs).
C. Link local area networks (LANs).
D. Make resources available to the Internet.
Answer: D
Q36. This question requires that you evaluate the underlined text to determine if it is correct.
According to the OSI model, encryption takes place on the transport layer.
Select the correct answer if the underlined text does not make the statement correct. Select
'No change is needed" if the underlined text makes the statement correct.
A. Presentation
B. Network
C. Application
D. No change is needed
Answer: A
Q37. Which of these is a public address space?
A. 192.168.0.0/16
B. 197.16.0.0/12
C. 10.0.0.0/8
D. 172.16.0.0/12
Answer: D
Q38. HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q39. In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
A. Contention
B. Negotiation
C. Kerberos
D. Token passing
Answer: A,D
Q40. Which of the following uses a tunneling protocol?
A. Internet
B. VPN
C. Extranet
D. VLAN
Answer: B