8.4 ~ VPN

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network? a. GRE b. L2TP c. SSL d. IPSec

a. GRE

Which of the following protocols provides authentication and encryption services for VPN traffic? a. IPsec b. L2TP c. SSL d. TCP

a. IPsec

Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP? a. L2TP b. SSL c. PPTP d. IPSec

c. PPTP

You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? a. SLIP b. PPP c. NetBEUI d. PPTP

d. PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.) a. PPPoE b. VNC c. PPTP d. L2TP e. RDP

c. PPTP d. L2TP

While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? a. DLP b. Access control list c. VPN d. Firewall

c. VPN

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement? a. VPN concentrator b. Site-to-site VPN c. Screened subnet d. Host-to-host VPN

a. VPN concentrator

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.) a. Configure the VPN connection to use IPsec. b. Configure the VPN connection to use PPTP. c. Configure the browser to send HTTPS requests through the VPN connection. d. Configure the VPN connection to use MS-CHAPv2. e. Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection.

a. Configure the VPN connection to use IPsec. c. Configure the browser to send HTTPS requests through the VPN connection.

What is a VPN's primary purpose? a. Support secure communications over an untrusted network. b. Allow remote systems to save on long-distance charges. c. Allow the use of network-attached printers. d. Support the distribution of public web documents.

a. Support secure communications over an untrusted network.

Which of the following statements about an SSL VPN are true? (Select two.) a. Uses port 443. b. Uses pre-shared keys for authentication. c. Encapsulates packets by adding a GRE header. d. Encrypts the entire communication session. e. Provides message integrity using HMAC. f. Uses UDP port 500.

a. Uses port 443. d. Encrypts the entire communication session.


Set pelajaran terkait

EAQ: Mental Health Disorders and Addictions

View Set

EAQs CH 36 Drugs Used to Treat Thyroid Disease

View Set

FM 245: Fashion Forecasting Midterm

View Set