Wide Area Networking (WAN) is a critical aspect of modern networking that connects multiple local area networks (LANs) over a large geographical area. Understanding WAN technologies, VPNs, QoS, and bandwidth management is essential for networking professionals. This quiz covers key concepts like PPP, MPLS, and Frame Relay, as well as different types of VPNs and QoS mechanisms.
MCQs on WAN Technologies
1. PPP, Frame Relay, and MPLS
What does the PPP protocol primarily provide in WANs? a) Error correction b) Data encryption c) Authentication d) None of the above
Which WAN technology is best suited for small to medium-sized enterprises requiring leased line connections? a) MPLS b) Frame Relay c) PPP d) ISDN
Which of the following is a characteristic of Frame Relay? a) Connection-oriented b) Error recovery c) Packet-switched d) Dedicated bandwidth
What is the main benefit of using MPLS in a WAN? a) Higher speed internet access b) Simplified troubleshooting c) Traffic engineering and prioritization d) Reduced cost of operation
What type of switching is used in Frame Relay? a) Circuit-switched b) Packet-switched c) Virtual Circuit d) Time-division multiplexing
PPP stands for: a) Point-to-Point Protocol b) Packet-to-Packet Protocol c) Point-to-Packet Protocol d) Protocol to Protocol
Which of the following is NOT a feature of PPP? a) Link quality monitoring b) Error detection c) Encryption d) Compression
What is the primary use of MPLS in WANs? a) To connect remote networks securely b) To provide a virtualized network layer for routing c) To manage traffic in a more efficient way d) To provide a leased line connection
Frame Relay operates at which OSI layer? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4
Which of the following is an advantage of PPP over other WAN protocols? a) Lower overhead b) Built-in authentication and encryption c) Support for higher speeds d) Compatibility with all hardware
2. VPN (Virtual Private Network)
What is the main purpose of a VPN? a) To increase the speed of the internet b) To encrypt data over the internet c) To prevent all types of attacks d) To enhance DNS resolution speed
Which of the following is a type of VPN? a) Site-to-Site b) Peer-to-Peer c) Star-topology VPN d) Mesh VPN
In a VPN, what does the encryption ensure? a) Authentication of users b) Data is transmitted over public networks securely c) Avoidance of data compression d) Routing of data within a private network
Which protocol is commonly used to establish a secure VPN connection? a) HTTP b) SSL c) FTP d) DNS
A Site-to-Site VPN connects: a) Individual devices to the internet b) Two or more remote networks c) One device to a local area network d) A client to a server
What is the main advantage of using a Remote Access VPN? a) It allows multiple networks to connect b) It allows individual users to connect securely from remote locations c) It is used for high-bandwidth communication d) It connects two remote sites
Which of the following is NOT a protocol used for VPN connections? a) PPTP b) L2TP c) IPsec d) HTTP
Which type of VPN is most suitable for large-scale enterprise connectivity? a) Client-to-Server VPN b) Site-to-Site VPN c) Remote Access VPN d) IPsec VPN
A VPN tunnel is created between which two components? a) Server and client b) Two VPN gateways c) Two routers d) A firewall and server
Which of the following is a disadvantage of using a VPN? a) Security vulnerabilities b) Data encryption delays c) Higher bandwidth usage d) Easy to set up
3. Types of VPNs (Site-to-Site, Remote Access)
A Remote Access VPN is often used by: a) Corporate employees working remotely b) Two branch offices connecting to each other c) Only large corporations d) Devices within a local area network
A Site-to-Site VPN is best used for: a) Connecting users to remote resources b) Connecting two or more networks securely c) Encrypting traffic between individual devices d) None of the above
In a Remote Access VPN, how does the client device authenticate to the VPN server? a) Using IP address b) Through a shared secret or certificates c) Via physical tokens d) By matching MAC addresses
Which of the following is true about IPsec in the context of a Site-to-Site VPN? a) It is a protocol used for secure remote access b) It provides end-to-end encryption c) It is used to encrypt email messages d) It does not offer encryption
In a VPN, what role does the VPN Gateway serve? a) Encrypts all data transmitted over the network b) Authenticates user access requests c) Acts as an intermediary for secure communication d) Manages the internet connection
Which of the following is commonly used in Remote Access VPNs for authentication? a) IP addresses b) Username and password c) MAC address d) Digital certificates
Which of the following technologies is often used to ensure security in Remote Access VPNs? a) SSL/TLS b) NAT c) BGP d) DHCP
Which is a typical use case for Site-to-Site VPNs? a) Connecting multiple branch offices to the corporate headquarters b) Allowing remote workers to access the internet securely c) Encrypting emails between clients d) None of the above
L2TP/IPsec is commonly used in: a) Site-to-Site VPNs b) Remote Access VPNs c) Internet browsing d) Public Wi-Fi networks
What is the main difference between Site-to-Site VPNs and Remote Access VPNs? a) Site-to-Site VPNs are used for individual device connections, while Remote Access is used for network-to-network connections b) Site-to-Site VPNs connect networks, while Remote Access connects individual devices to networks c) Remote Access VPNs are slower than Site-to-Site d) There is no difference between them
4. Basic QoS (Quality of Service)
QoS is primarily used to: a) Improve security b) Optimize bandwidth usage c) Prioritize certain types of traffic over others d) Encrypt data packets
Which type of traffic is generally given the highest priority in a QoS scheme? a) Video streaming b) Voice over IP (VoIP) c) File downloads d) Web browsing
The term “bandwidth throttling” in QoS refers to: a) Reducing bandwidth usage for specific traffic b) Increasing the bandwidth of low-priority traffic c) Encrypting the traffic d) Increasing bandwidth for VoIP calls
In a QoS model, which protocol is commonly used to mark traffic for priority? a) FTP b) TCP c) IP Precedence d) HTTP
What is the DSCP in QoS? a) Differentiated Service Code Point b) Data Security Code Point c) Data Service Connection Point d) Delivery Service Control Point
QoS is essential for which type of network applications? a) Video conferencing b) File transfer c) Email services d) None of the above
Which mechanism in QoS helps in managing traffic to avoid network congestion? a) Traffic shaping b) Traffic filtering c) Load balancing d) Data encryption
Which of the following is a type of QoS queue? a) FIFO (First In, First Out) b) Round Robin c) Priority Queue d) All of the above
The term “latency” in the context of QoS refers to: a) The speed at which data is transmitted b) The time delay in sending and receiving data c) The amount of data transferred d) The data security during transfer
Which of the following is the primary goal of Basic QoS in a WAN? a) To ensure consistent data transmission b) To prevent data breaches c) To enable faster internet connections d) To limit the data usage of users
Answer Key
Qno
Answer
1
c) Authentication
2
b) Frame Relay
3
c) Packet-switched
4
c) Traffic engineering and prioritization
5
b) Packet-switched
6
a) Point-to-Point Protocol
7
c) Encryption
8
b) Frame Relay
9
b) Layer 2
10
b) Built-in authentication and encryption
11
b) To encrypt data over the internet
12
a) Site-to-Site
13
b) Through a shared secret or certificates
14
b) SSL
15
b) Two or more remote networks
16
b) It allows individual users to connect securely from remote locations
17
b) Site-to-Site VPN
18
b) Through a shared secret or certificates
19
b) Two VPN gateways
20
b) It automatically runs queries and triggers actions
21
a) Corporate employees working remotely
22
b) Connecting two or more networks securely
23
b) Username and password
24
b) It provides end-to-end encryption
25
c) Acts as an intermediary for secure communication
26
b) Username and password
27
a) SSL/TLS
28
a) Connecting multiple branch offices to the corporate headquarters
29
b) Remote Access VPNs
30
b) Site-to-Site VPNs connect networks, while Remote Access connects individual devices to networks
31
c) Prioritize certain types of traffic over others