Chapter 12 Quiz
Wen, a network engineer for a mid-sized company, is rolling out a virtual private network (VPN) solution that is easy to set up, manage, and maintain and represents the majority of VPN platforms on the market. What type of VPN is Wen deploying? Customer premise equipment (CPE) Do it yourself (DIY) Network Policy and Access Services (NPAS) Operating system (OS)─based
Customer premise equipment (CPE)
A virtual private network (VPN) replaces a firewall. True False
False
A virtual private network (VPN) server for remote access must be located in the demilitarized zone (DMZ). True False
False
Microsoft RD Web Access connects remote clients to internal resources over a virtual private network (VPN) connection. True False
False
Oscar is deploying a virtual private network (VPN) solution for his company. The VPN needs to connect to remote servers by their Internet Protocol (IP) addresses rather than using network address translation (NAT). What type of VPN is Oscar deploying? Customer premise equipment (CPE) Hardware VPN Operating system (OS) Internet Protocol Security (IPSec)
Operating system (OS)
Nimi has deployed a new virtual private network (VPN) solution in her company's IT infrastructure. She is testing the connection to the server from a client. Which tool is the best choice for her to use? IPConfig Ping Transmission Control Protocol (TCP) User Datagram Protocol (UDP)
Ping
Jacob is a remote employee. He clicks the Start menu button in Windows and selects an application to run. Most of the time, he is unaware that he is really accessing the application on a server at his company's main office several miles away. What solution is he using? Hosted services RD RemoteApp RD Web Access SSL NAT Transversal
RD RemoteApp
Remote Desktop Connection (RDC) is a built-in application that uses what proprietary protocol? Internet Key Exchange v2 (IKEv2) Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP)
What is a virtual private network (VPN) protocol that requires public key infrastructure (PKI) support to obtain and use a certificate? Internet Key Exchange v2 (IKEv2) Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
A customer premise equipment (CPE)-based virtual private network (VPN) is a VPN appliance. True False
True
A virtual private network (VPN) implementation best practice is to protect the VPN server behind a firewall. True False
True
A virtual private network (VPN) implementation best practice is to use strong authentication. True False
True
An intranet virtual private network (VPN) connects two or more internal networks. True False
True
Extranets differ from intranets in that remote users outside of the enterprise are allowed access to resources inside the network. True False
True
Microsoft Remote Assistance allows support professionals to remotely control a user's system. True False
True
Onion routing limits a network's vulnerability to eavesdropping and traffic analysis. True False
True
RD RemoteApp is a Microsoft solution that runs on a Microsoft Remote Desktop Services (RDS) server but appears to end users as if it were actually running on their systems. True False
True
Remote Desktop Connection (RDC) is a built-in application that uses Remote Desktop Protocol (RDP). True False
True
With hosted services, an Internet service provider (ISP) or a software vendor leases applications to organizations. True False
True
Carl is a student in a computer networking class who is studying virtual private network (VPN) implementations. He is learning the basics about VPNs. Which of the following statements does he find is TRUE? VPNs are primarily hardware solutions. VPNs are primarily software solutions. VPNs are both hardware and software solutions. VPNs are network address translation (NAT) solutions.
VPNs are both hardware and software solutions.