EN 6-8Study Set
What algorithm is used with IPsec to provide data confidentiality? MD5 Diffie-Hellman RSA AES SHA
AES
What two algorithms can be part of an IPsec policy to provide encryption and hashing to protect interesting traffic? (Choose two.) AES SHA DH RSA PSK
AES SHA
Which situation describes data transmissions over a WAN connection? An employee prints a file through a networked printer that is located in another building. A manager sends an email to all employees in the department with offices that are located in several buildings. An employee shares a database file with a co-worker who is located in a branch office on the other side of the city. A network administrator in the office remotely accesses a web server that is located in the data center at the edge of the campus.
An employee shares a database file with a co-worker who is located in a branch office on the other side of the city.
Which network scenario will require the use of a WAN? Employee workstations need to obtain dynamically assigned IP addresses. Employees need to connect to the corporate email server through a VPN while traveling. Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network. Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building.
Employees need to connect to the corporate email server through a VPN while traveling.
What is a disadvantage when both sides of a communication use PAT? Host IPv4 addressing is complicated. End-to-end IPv4 traceability is lost. The flexibility of connections to the Internet is reduced. The security of the communication is negatively impacted.
End-to-end IPv4 traceability is lost.
Which two technologies are categorized as private WAN infrastructures? (Choose two.) cable DSL Frame Relay MetroE VPN
Frame Relay MetroE
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols? OSPF IPsec IKE GRE
GRE
Which type of VPN involves passenger, carrier, and transport protocols? GRE over IPsec IPsec virtual tunnel interface MPLS VPN dynamic multipoint VPN
GRE over IPsec
Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces? IPsec virtual tunnel interface dynamic multipoint VPN MPLS VPN GRE over IPsec
IPsec virtual tunnel interface
Which statement describes an important characteristic of a site-to-site VPN? It must be statically set up. It is ideally suited for use by mobile workers. It requires using a VPN client on the host PC. It is commonly implemented over dialup and cable modem networks. After the initial connection is established, it can dynamically change connection information.
It must be statically set up
Which is a requirement of a site-to-site VPN? It requires a client/server architecture. It requires the placement of a VPN server at the edge of the company network. It requires hosts to use VPN client software to encapsulate traffic. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.) MD5 SHA AES DH RSA
MD5 SHA
Which type of VPN has both Layer 2 and Layer 3 implementations? MPLS VPN IPsec virtual tunnel interface dynamic multipoint VPN GRE over IPsec
MPLS VPN
How is "tunneling" accomplished in a VPN? New headers from one or more VPN protocols encapsulate the original packets. All packets between two hosts are assigned to a single physical medium to ensure that the packets are kept private. Packets are disguised to look like other types of traffic so that they will be ignored by potential attackers. A dedicated circuit is established between the source and destination devices for the duration of the connection.
New headers from one or more VPN protocols encapsulate the original packets.
Which type of VPN connects using the Transport Layer Security (TLS) feature? SSL VPN GRE over IPsec dynamic multipoint VPN IPsec virtual tunnel interface
SSL VPN
Which two WAN infrastructure services are examples of private connections? (Choose two.) T1/E1 wireless DSL cable Frame Relay
T1/E1 Frame Relay
Which statement describes a VPN? VPNs use dedicated physical connections to transfer data between remote users. VPNs use logical connections to create public networks through the Internet. VPNs use open source virtualization software to create the tunnel through the Internet. VPNs use virtual connections to create a private network through a public network.
VPNs use virtual connections to create a private network through a public network.
Which two statements about the relationship between LANs and WANs are true? (Choose two.) Both LANs and WANs connect end devices. WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. LANs connect multiple WANs together. WANs must be publicly-owned, but LANs can be owned by either public or private entities. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.
WANs connect LANs at slower speed bandwidth than LANs connect their internal end devices. WANs are typically operated through multiple ISPs, but LANs are typically operated by single organizations or individuals.
What is the function of the Diffie-Hellman algorithm within the IPsec framework? allows peers to exchange shared keys provides strong data encryption guarantees message integrity provides authentication
allows peers to exchange shared keys
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA? clientless SSL client-based SSL site-to-site using a preshared key site-to-site using an ACL
clientless SSL
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.) IPsec VPN clientless SSL VPN GRE over IPsec VPN client-based IPsec VPN IPsec Virtual Tunnel Interface VPN
clientless SSL VPN client-based IPsec VPN
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN? guarantees message integrity authenticates the IPsec peers protects IPsec keys during session negotiation creates a secure channel for key negotiation
guarantees message integrity
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit? confidentiality integrity authentication secure key exchange
integrity
A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.) cable leased line Ethernet WAN municipal Wi-Fi digital subscriber line
leased line Ethernet WAN
In NAT terms, what address type refers to the globally routable IPv4 address of a destination host on the Internet? inside global outside local outside global inside local
outside global
What does NAT overloading use to track multiple internal hosts that use one inside global address? MAC addresses port numbers IP addresses autonomous system numbers
port numbers
What type of address is 10.131.48.7? private public
private
What type of address is 192.168.7.98? private public
private
What type of address is 198.133.219.148? public private
public
What type of address is 64.100.190.189? public private
public
Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.) DSL switch router another ASA multilayer switch Frame Relay switch
router another ASA
Which two technologies provide enterprise-managed VPN solutions? (Choose two.) Frame Relay site-to-site VPN Layer 2 MPLS VPN Layer 3 MPLS VPN remote access VPN
site-to-site VPN remote access VPN
What two addresses are specified in a static NAT configuration? the inside local and the inside global the inside global and the outside local the inside local and the outside global the outside global and the outside local
the inside local and the inside global
Which circumstance would result in an enterprise deciding to implement a corporate WAN? when its employees become distributed across many branch locations when the network will span multiple buildings when the number of employees exceeds the capacity of the LAN when the enterprise decides to secure its corporate LAN
when its employees become distributed across many branch locations