Tick the box that best represents the
category to which each benefits of teleworking belongs.
[3]
|
||||||||||||||||||
Match the following terms to
the appropriate definition. [5]
|
||||||||||||||||||
(i)
|
Briefly describe Digital
Subscriber Line (DSL). [1]
|
|||||||||||||||||
DSL provides high-speed
connections over installed copper wire system.
|
||||||||||||||||||
(ii)
|
Compare Asymmetric DSL (ADSL) with Symmetric DSL (SDSL). [4]
|
|||||||||||||||||
ADSL provides higher downstream
bandwidth to the user than upload bandwidth.
SDSL provides the same capacity
in both directions.
|
||||||||||||||||||
What is Virtual Private
Network (VPN)? [3]
|
||||||||||||||||||
A VPN is a private network that uses a public network
(usually the Internet) to connect
remote sites or users together. The VPN uses "virtual" connections routed through the Internet from the business's private network
to the remote site or employee. By using a VPN, businesses ensure security --
anyone intercepting the encrypted data can't
read it
|
||||||||||||||||||
State any TWO benefits of
VPNs.
[4]
|
||||||||||||||||||
Any TWO of the followings,
Cost savings
•
Enable organizations to use cost-effective, third-party Internet
transport to connect remote offices and remote users to the main site.
Scalability
•
Enable organizations to use the Internet infrastructure within ISPs
and devices, which makes it easy to add new users.
Compatibility with broadband
technology
•
Allow mobile workers and telecommuters to take advantage of
high-speed, broadband connectivity, such as DSL and cable, to gain access to
the networks of their organization, providing workers flexibility and
efficiency.
•
Provide a cost-effective solution for connecting remote offices.
Security
•
Can include security mechanisms that provide the highest level of
security by using advanced encryption and authentication protocols that
protect data from unauthorized access.
|
||||||||||||||||||
Tick the box next to each statement that
best matches the VPN statement to its type. [2]
|
||||||||||||||||||
Refer to the following diagram, write down the
command to configure a GRE tunnel on router R2 and advertise the 192.168.2.0
network through OSPF. [5]
|
||||||||||||||||||
R2(config)# interface tunnel 0
R2(config-if)# tunnel mode
gre ip
R2(config-if)# ip address
192.168.2.2 255.255.255.0
R2(config-if)# tunnel source
209.165.201.2
R2(config-if)# tunnel
destination 209.165.201.1
R2(config-if)# router ospf 1
R2(config-if)# network
192.168.2.0 0.0.0.255 area 0
|
||||||||||||||||||
Briefly describe the following FOUR fuctions
provided by IPsec.
[8]
|
||||||||||||||||||
encrypt the data before
transmitting across the network
verify that data has not been
changed while in transit, if tampering is detected, the packet is dropped
verify the identity of the
source of the data that is sent, ensures that the connection is made with the
desired communication partner, IPsec uses Internet Key Exchange (IKE) to
authenticate users and devices that can carry out communication
independently.
detect and reject replayed
packets and helps prevent spoofing
|
||||||||||||||||||
The
syslog protocol allows networking devices to send their system messages
across the network to syslog servers. Write
down the command to configure router R1 to perform the following tasks to
configure and generate logging messages:
[3]
·
Set
the logging destination to 192.168.1.3
·
Set
the trapping severity to ‘Warning’ – level 4
·
Set
the logging source interface to gigabitEthernet 0/0
|
||||||||||||||||||
R1(config)# logging
192.168.1.3
R1(config)# logging trap 4
R1(config)# logging
source-interface g0/0
|
||||||||||||||||||
Name the THREE elements in the SNMP protocol. [3]
|
||||||||||||||||||
The Manager, the agent, and the MIB
|
||||||||||||||||||
Tick the appropriate field to classify each SNMP
characteristic as Version 2c, Version 3 or both.
[4]
|
||||||||||||||||||
List any TWO security feature improvements in SNMPv3 when compared with
the earlier versions 1 and 2.
[2]
|
||||||||||||||||||
Authentication, encryption
|
||||||||||||||||||
Classify each network monitoring tool characterisitc
as either SNMP or NetFlow. [3]
|
Here will share the answer and have academic discussion! Welcome to point out any mistakes :)
2018年1月28日 星期日
ITP4928 Tutorial 3
訂閱:
張貼留言 (Atom)
沒有留言:
張貼留言