Testout - Network 10.4.8 Practice Questions
Which IPSec subprotocol provides data encryption? AES ESP SSL AH
ESP
Which of the following can route Layer 3 protocols across an IP network? PPTP GRE IPsec SSL
GRE
Listen to exam instructions Which of the following Network layer protocols provides authentication and encryption services for IP-based network traffic? L2TP SSL TCP IPsec
IPsec
Which of the following VPN protocols is no longer considered secure? SSL PPTP TLS IPsec
PPTP
Which VPN tunnel style routes only certain types of traffic? Full Host-to-host Site-to-site Split
Split
Which of the following statements about an SSL VPN are true? (Select two.) Encapsulates packets by adding a GRE header. Provides message integrity using HMAC. Uses UDP port 500. Uses port 443. Encrypts the entire communication session. Uses pre-shared keys for authentication.
Uses port 443. Encrypts the entire communication session.
Which of the following purposes is a VPN primarily used for? Support secured communications over an untrusted network. Allow the use of network-attached printers. Allow remote systems to save on long-distance charges. Support the distribution of public web documents.
Support secured communications over an untrusted network.
Which statement BEST describes IPsec when used in tunnel mode? The entire data packet, including headers, is encapsulated. Packets are routed using the original headers, and only the payload is encrypted. The identities of the communicating parties are not protected. IPsec in tunnel mode may not be used for WAN traffic.
The entire data packet, including headers, is encapsulated.
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.) Configure the VPN connection to use PPTP. Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. Configure the VPN connection to use MS-CHAPv2. Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.
Listen to exam instructions A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? IDS IPS DMZ RADIUS VPN concentrator
VPN concentrator