Day 39 Back to Exams Page 1. Cell-switched technologies form a shared bandwidth environment so that the service provider can guarantee customers a certain level of bandwidth through their infrastructure.TrueFalseQuestion 1 of 11 2. ____ are examples of technologies that are NBMA by default.Frame RelayATMISDN DSLQuestion 2 of 11 3. Point-to-Point Protocol (PPP) can be used when you have a Cisco device connecting to a non-Cisco device.TrueFalseQuestion 3 of 11 4. Typical VSAT components include the following:Master earth stationRemote earth stationSatelliteGround connectQuestion 4 of 11 5. Even though the VPN concept implies security most of the time, unsecured VPNs also exist.TrueFalseQuestion 5 of 11 6. ______ VPN allows secure communication between sites without having to pass through a headquarters VPN server or router, which is the traditional method.Site to siteDynamic MultipointExtranetHub and spokeQuestion 6 of 11 7. MPLS comes in two different flavors:Frame Mode MPLSCell Mode MPLSFast Mode MPLSSlow Mode MPLSQuestion 7 of 11 8. PPP has built-in authentication in the form of?MD5Password Authentication Protocol (PAP)Challenge Handshake Authentication Protocol (CHAP)AESQuestion 8 of 11 9. Cloud computing very conveniently addresses two problem areas that we need to be aware of as network administrators.business problemssecurity problemsadministration problemsbusiness problemsQuestion 9 of 11 10. The four cloud computing deployment groups available are:Private cloudCommunity cloudPublic cloudHybrid cloudExternal cloudQuestion 10 of 11 11. With this type of virtual machine manager, you purchase a big server and simply load the VM software on the raw hardware.Bare metal machine managersBase machine with managerHypervisors that run on an existing OSSupervisor with OSQuestion 11 of 11 Loading...