Testout - Network 10.4.8 Practice Questions

Ace your homework & exams now with Quizwiz!

Which IPSec subprotocol provides data encryption? AES ESP SSL AH

ESP

Which of the following can route Layer 3 protocols across an IP network? PPTP GRE IPsec SSL

GRE

Listen to exam instructions Which of the following Network layer protocols provides authentication and encryption services for IP-based network traffic? L2TP SSL TCP IPsec

IPsec

Which of the following VPN protocols is no longer considered secure? SSL PPTP TLS IPsec

PPTP

Which VPN tunnel style routes only certain types of traffic? Full Host-to-host Site-to-site Split

Split

Which of the following statements about an SSL VPN are true? (Select two.) Encapsulates packets by adding a GRE header. Provides message integrity using HMAC. Uses UDP port 500. Uses port 443. Encrypts the entire communication session. Uses pre-shared keys for authentication.

Uses port 443. Encrypts the entire communication session.

Which of the following purposes is a VPN primarily used for? Support secured communications over an untrusted network. Allow the use of network-attached printers. Allow remote systems to save on long-distance charges. Support the distribution of public web documents.

Support secured communications over an untrusted network.

Which statement BEST describes IPsec when used in tunnel mode? The entire data packet, including headers, is encapsulated. Packets are routed using the original headers, and only the payload is encrypted. The identities of the communicating parties are not protected. IPsec in tunnel mode may not be used for WAN traffic.

The entire data packet, including headers, is encapsulated.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.) Configure the VPN connection to use PPTP. Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection. Configure the VPN connection to use MS-CHAPv2. Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

Listen to exam instructions A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? IDS IPS DMZ RADIUS VPN concentrator

VPN concentrator


Related study sets

Ch. 10 (Externalities) Key Terms

View Set

Introduction to Literature shorter version

View Set

Week 2: Software Process - CS 427

View Set

Topics 4 and 5: Kinetic Theory and Thermodynamics

View Set

Dr. Britt PSYCH 101 Exam 2 Chps 3-4

View Set

Chapter 17 Eye and Ear Diseases/ Disorders

View Set