Mod 8 VPNs

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

44. What algorithm is used with IPsec to provide data confidentiality?

AES

19. What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)

AES SHA

10. Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

AH

17. Which network scenario will require the use of a WAN?

Employees need to connect to the corporate email server through a VPN while traveling.

59. Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

GRE over IPsec

61. Which type of VPN involves passenger, carrier, and transport protocols?

GRE over IPsec

11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?

HMAC

50. Which two end points can be on the other side of an ASA site-to-site VPN configured using ASDM? (Choose two.)

ISR router another ASA

1. Which two statements describe a remote access VPN? (Choose two.)

It is used to connect individual hosts securely to a company network over the Internet. It may require VPN client software on hosts.

31. Which statement describes an important characteristic of a site-to-site VPN?

It must be statically set up.

23. Which is a requirement of a site-to-site VPN?

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

9. Which VPN type is a service provider managed VPN?

Layer 3 MPLS VPN

56. Which type of VPN has both Layer 2 and Layer 3 implementations?

MPLS VPN

32. How is "tunneling" accomplished in a VPN?

New headers from one or more VPN protocols encapsulate the original packets.

18. What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

SHA MD5

28. Which type of VPN uses the public key infrastructure and digital certificates?​

SSL VPN

49. Which type of VPN connects using the Transport Layer Security (TLS) feature?

SSL VPN

12. Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?

The longer the key, the more key possibilities exist.

33. Which statement describes a VPN?

VPNs use virtual connections to create a private network through a public network.

20. Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

22. Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

2. The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?

confidentiality

4. Which technique is necessary to ensure a private transfer of data using a VPN?

encryption

7. True or False? All VPNs securely transmit clear text across the Internet.

false

43. What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

guarantees message integrity

5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

hub-to-spoke spoke-to-spoke

21. Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

integrity

3. Which type of VPN may require the Cisco VPN Client software?

remote access VPN

45. Which two technologies provide enterprise-managed VPN solutions? (Choose two.)

remote access VPN site-to-site VPN

8. Which solution allows workers to telecommute effectively and securely?

remote-access VPN

73. Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)

router another ASA

13. What is a type of VPN that is generally transparent to the end user?

site-to-site

6. What are two reasons a company would use a VPN? (Choose two.)

to connect remote users to the network to allow suppliers to access the network


Ensembles d'études connexes

N316A Autonomic Nervous Quiz [2]

View Set

EMR -Chapters 1 through 27 FDLTCC 2020

View Set

Texas History Exam 2- Essay Questions

View Set

Final Exam Study Guide IT Essentials 2 (ISTC 1033)

View Set

Chapter 14: Strategic Management

View Set

S66 Unit 8 (Regulation of Securities and Their Issuers) Quiz

View Set