Modules 6 - 8: WAN Concepts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the function of the Diffie-Hellman algorithm within the IPsec framework?

allows peers to exchange shared keys

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

clientless SSL VPN client-based IPsec VPN

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

guarantees message integrity

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

integrity

In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet?

outside global

What does NAT overloading use to track multiple internal hosts that use one inside global address?

port numbers

What type of address is 64.100.190.189?

public

Which circumstance would result in an enterprise deciding to implement a corporate WAN?

when its employees become distributed across many branch locations

What algorithm is used with IPsec to provide data confidentiality?

AES

Which situation describes data transmissions over a WAN connection?

An employee shares a database file with a co-worker who is located in a branch office on the other side of the city

What are two tasks to perform when configuring static NAT? (Choose two.)

Create a mapping between the inside local and outside local addresses Identify the participating interfaces as inside or outside interfaces.

Which network scenario will require the use of a WAN?

Employees need to connect to the corporate email server through a VPN while traveling.

Which two technologies are categorized as private WAN infrastructures? (Choose two.)

Frame Relay MetroE

Which two WAN infrastructure services are examples of private connections? (Choose two.)

Frame Relay T1/E1

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

IPsec virtual tunnel interface

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses.

Which statement describes an important characteristic of a site-to-site VPN?

It must be statically set up.

Which is a requirement of a site-to-site VPN?

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.)

NAT provides a solution to slow down the IPv4 address depletion. NAT introduces problems for some applications that require end-to-end connectivity.

How is "tunneling" accomplished in a VPN?

New headers from one or more VPN protocols encapsulate the original packets.

A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task?

Router# show ip nat translations

What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.)

SHA AES

What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

SHA MD5

What is a disadvantage of NAT?

There is no end-to-end addressing.

Which statement describes a VPN?

VPNs use virtual connections to create a private network through a public network.

Which two statements about the relationship between LANs and WANs are true? (Choose two.)

WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices.​


संबंधित स्टडी सेट्स

Cyber Security- Ch.5 Security Operations Quiz

View Set

government executive branch unit test

View Set

INDEPENDENT LIVING: final review

View Set

Bible test review unit 7 lesson 25-29

View Set

Chapter 13: Fiscal Policy, Deficits, and Debts

View Set

National Nutrition Policy- Health Promotion

View Set

White Flight and Suburbanization 1940s-1970

View Set

Module 4 Chapter 37 Care of Patients with Shock

View Set

Ch. 8 Principal Instruments of Transfer

View Set