MCQs on Wide Area Networking (WAN) | CCNA Certification MCQs

Wide Area Networking (WAN) is a critical aspect of modern networking that connects multiple local area networks (LANs) over a large geographical area. Understanding WAN technologies, VPNs, QoS, and bandwidth management is essential for networking professionals. This quiz covers key concepts like PPP, MPLS, and Frame Relay, as well as different types of VPNs and QoS mechanisms.


MCQs on WAN Technologies

1. PPP, Frame Relay, and MPLS

  1. What does the PPP protocol primarily provide in WANs?
    a) Error correction
    b) Data encryption
    c) Authentication
    d) None of the above
  2. Which WAN technology is best suited for small to medium-sized enterprises requiring leased line connections?
    a) MPLS
    b) Frame Relay
    c) PPP
    d) ISDN
  3. Which of the following is a characteristic of Frame Relay?
    a) Connection-oriented
    b) Error recovery
    c) Packet-switched
    d) Dedicated bandwidth
  4. What is the main benefit of using MPLS in a WAN?
    a) Higher speed internet access
    b) Simplified troubleshooting
    c) Traffic engineering and prioritization
    d) Reduced cost of operation
  5. What type of switching is used in Frame Relay?
    a) Circuit-switched
    b) Packet-switched
    c) Virtual Circuit
    d) Time-division multiplexing
  6. PPP stands for:
    a) Point-to-Point Protocol
    b) Packet-to-Packet Protocol
    c) Point-to-Packet Protocol
    d) Protocol to Protocol
  7. Which of the following is NOT a feature of PPP?
    a) Link quality monitoring
    b) Error detection
    c) Encryption
    d) Compression
  8. What is the primary use of MPLS in WANs?
    a) To connect remote networks securely
    b) To provide a virtualized network layer for routing
    c) To manage traffic in a more efficient way
    d) To provide a leased line connection
  9. Frame Relay operates at which OSI layer?
    a) Layer 1
    b) Layer 2
    c) Layer 3
    d) Layer 4
  10. Which of the following is an advantage of PPP over other WAN protocols?
    a) Lower overhead
    b) Built-in authentication and encryption
    c) Support for higher speeds
    d) Compatibility with all hardware

2. VPN (Virtual Private Network)

  1. What is the main purpose of a VPN?
    a) To increase the speed of the internet
    b) To encrypt data over the internet
    c) To prevent all types of attacks
    d) To enhance DNS resolution speed
  2. Which of the following is a type of VPN?
    a) Site-to-Site
    b) Peer-to-Peer
    c) Star-topology VPN
    d) Mesh VPN
  3. In a VPN, what does the encryption ensure?
    a) Authentication of users
    b) Data is transmitted over public networks securely
    c) Avoidance of data compression
    d) Routing of data within a private network
  4. Which protocol is commonly used to establish a secure VPN connection?
    a) HTTP
    b) SSL
    c) FTP
    d) DNS
  5. A Site-to-Site VPN connects:
    a) Individual devices to the internet
    b) Two or more remote networks
    c) One device to a local area network
    d) A client to a server
  6. What is the main advantage of using a Remote Access VPN?
    a) It allows multiple networks to connect
    b) It allows individual users to connect securely from remote locations
    c) It is used for high-bandwidth communication
    d) It connects two remote sites
  7. Which of the following is NOT a protocol used for VPN connections?
    a) PPTP
    b) L2TP
    c) IPsec
    d) HTTP
  8. Which type of VPN is most suitable for large-scale enterprise connectivity?
    a) Client-to-Server VPN
    b) Site-to-Site VPN
    c) Remote Access VPN
    d) IPsec VPN
  9. A VPN tunnel is created between which two components?
    a) Server and client
    b) Two VPN gateways
    c) Two routers
    d) A firewall and server
  10. Which of the following is a disadvantage of using a VPN?
    a) Security vulnerabilities
    b) Data encryption delays
    c) Higher bandwidth usage
    d) Easy to set up

3. Types of VPNs (Site-to-Site, Remote Access)

  1. A Remote Access VPN is often used by:
    a) Corporate employees working remotely
    b) Two branch offices connecting to each other
    c) Only large corporations
    d) Devices within a local area network
  2. A Site-to-Site VPN is best used for:
    a) Connecting users to remote resources
    b) Connecting two or more networks securely
    c) Encrypting traffic between individual devices
    d) None of the above
  3. In a Remote Access VPN, how does the client device authenticate to the VPN server?
    a) Using IP address
    b) Through a shared secret or certificates
    c) Via physical tokens
    d) By matching MAC addresses
  4. Which of the following is true about IPsec in the context of a Site-to-Site VPN?
    a) It is a protocol used for secure remote access
    b) It provides end-to-end encryption
    c) It is used to encrypt email messages
    d) It does not offer encryption
  5. In a VPN, what role does the VPN Gateway serve?
    a) Encrypts all data transmitted over the network
    b) Authenticates user access requests
    c) Acts as an intermediary for secure communication
    d) Manages the internet connection
  6. Which of the following is commonly used in Remote Access VPNs for authentication?
    a) IP addresses
    b) Username and password
    c) MAC address
    d) Digital certificates
  7. Which of the following technologies is often used to ensure security in Remote Access VPNs?
    a) SSL/TLS
    b) NAT
    c) BGP
    d) DHCP
  8. Which is a typical use case for Site-to-Site VPNs?
    a) Connecting multiple branch offices to the corporate headquarters
    b) Allowing remote workers to access the internet securely
    c) Encrypting emails between clients
    d) None of the above
  9. L2TP/IPsec is commonly used in:
    a) Site-to-Site VPNs
    b) Remote Access VPNs
    c) Internet browsing
    d) Public Wi-Fi networks
  10. What is the main difference between Site-to-Site VPNs and Remote Access VPNs?
    a) Site-to-Site VPNs are used for individual device connections, while Remote Access is used for network-to-network connections
    b) Site-to-Site VPNs connect networks, while Remote Access connects individual devices to networks
    c) Remote Access VPNs are slower than Site-to-Site
    d) There is no difference between them

4. Basic QoS (Quality of Service)

  1. QoS is primarily used to:
    a) Improve security
    b) Optimize bandwidth usage
    c) Prioritize certain types of traffic over others
    d) Encrypt data packets
  2. Which type of traffic is generally given the highest priority in a QoS scheme?
    a) Video streaming
    b) Voice over IP (VoIP)
    c) File downloads
    d) Web browsing
  3. The term “bandwidth throttling” in QoS refers to:
    a) Reducing bandwidth usage for specific traffic
    b) Increasing the bandwidth of low-priority traffic
    c) Encrypting the traffic
    d) Increasing bandwidth for VoIP calls
  4. In a QoS model, which protocol is commonly used to mark traffic for priority?
    a) FTP
    b) TCP
    c) IP Precedence
    d) HTTP
  5. What is the DSCP in QoS?
    a) Differentiated Service Code Point
    b) Data Security Code Point
    c) Data Service Connection Point
    d) Delivery Service Control Point
  6. QoS is essential for which type of network applications?
    a) Video conferencing
    b) File transfer
    c) Email services
    d) None of the above
  7. Which mechanism in QoS helps in managing traffic to avoid network congestion?
    a) Traffic shaping
    b) Traffic filtering
    c) Load balancing
    d) Data encryption
  8. Which of the following is a type of QoS queue?
    a) FIFO (First In, First Out)
    b) Round Robin
    c) Priority Queue
    d) All of the above
  9. The term “latency” in the context of QoS refers to:
    a) The speed at which data is transmitted
    b) The time delay in sending and receiving data
    c) The amount of data transferred
    d) The data security during transfer
  10. Which of the following is the primary goal of Basic QoS in a WAN?
    a) To ensure consistent data transmission
    b) To prevent data breaches
    c) To enable faster internet connections
    d) To limit the data usage of users

Answer Key

QnoAnswer
1c) Authentication
2b) Frame Relay
3c) Packet-switched
4c) Traffic engineering and prioritization
5b) Packet-switched
6a) Point-to-Point Protocol
7c) Encryption
8b) Frame Relay
9b) Layer 2
10b) Built-in authentication and encryption
11b) To encrypt data over the internet
12a) Site-to-Site
13b) Through a shared secret or certificates
14b) SSL
15b) Two or more remote networks
16b) It allows individual users to connect securely from remote locations
17b) Site-to-Site VPN
18b) Through a shared secret or certificates
19b) Two VPN gateways
20b) It automatically runs queries and triggers actions
21a) Corporate employees working remotely
22b) Connecting two or more networks securely
23b) Username and password
24b) It provides end-to-end encryption
25c) Acts as an intermediary for secure communication
26b) Username and password
27a) SSL/TLS
28a) Connecting multiple branch offices to the corporate headquarters
29b) Remote Access VPNs
30b) Site-to-Site VPNs connect networks, while Remote Access connects individual devices to networks
31c) Prioritize certain types of traffic over others
32b) Voice over IP (VoIP)
33a) Reducing bandwidth usage for specific traffic
34c) IP Precedence
35a) Differentiated Service Code Point
36a) Video conferencing
37a) Traffic shaping
38d) All of the above
39b) The time delay in sending and receiving data
40a) To ensure consistent data transmission

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top