Filters
Question type

Study Flashcards

MATCHING -an IETF standard for secure authentication of requests for resource access


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) A) and D)
L) E) and I)

Correct Answer

verifed

verified

What is AES and why is AES a better encryption method to use compared to DES?

Correct Answer

verifed

verified

AES is stronger than 3DES and works fast...

View Answer

Which of the following is true about software VPNs?


A) more cost-effective than hardware VPNs
B) best when all router and firewall hardware is the same
C) usually less flexible than hardware VPNs
D) configuration is easy since there is no OS to rely upon

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

How is authentication implemented in a VPN?

Correct Answer

verifed

verified

The type of authentication used in a VPN depends on the tunneling protocol.Many networks use IPsec to authenticate users; VPN participants establish an SA and exchange keys to authenticate one another.PPTP,which is used for dial-up access to a remote server,uses MS-CHAP,in which both computers exchange authentication packets.TLS/SSL uses certificate-based authentication.RADIUS is also commonly used for authentication services in VPN architecture. VPNs also use digital certificates to authenticate users and encryption to ensure that communications cannot be read even if they are intercepted in transit.

Network gateways are ____________ of the VPN connection.

Correct Answer

verifed

verified

Which of the following is NOT a factor a secure VPN design should address?


A) encryption
B) authentication
C) nonrepudiation
D) performance

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which IPsec component is software that handles the tasks of encrypting,authenticating, decrypting,and checking packets?


A) ISAKMP
B) IKE
C) IPsec driver
D) Oakley protocol

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a disadvantage of putting the VPN on a firewall?


A) centralized control of network access security
B) more configuration mistakes
C) VPN and firewall use the same configuration tools
D) Internet and VPN traffic compete for resources

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication?


A) IPsec
B) L2TP
C) PPTP
D) SSL

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

B

Which of the following is NOT an essential element of a VPN?


A) VPN server
B) tunnel
C) VPN client
D) authentication server

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.

A) True
B) False

Correct Answer

verifed

verified

MATCHING -a digital token sent from the Authentication Server to the client


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) C) and D)
L) E) and J)

Correct Answer

verifed

verified

Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP?


A) SSL
B) L2TP
C) IPsec
D) PPTP

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

MATCHING -a protocol developed by Netscape Communications Corporation as a way of enabling Web servers and browsers to exchange encrypted information


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) E) and G)
L) H) and J)

Correct Answer

verifed

verified

Which of the following is true about using VPNs?


A) more expensive than leased lines
B) can use an existing broadband connection
C) usually higher performance than leased lines
D) not dependent on an ISP

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

List two advantages and two disadvantages of VPNs.

Correct Answer

verifed

verified

Advantages:
Far less expensive than leas...

View Answer

MATCHING -an IPsec protocol that encrypts the header and data components of TCP/IP packets


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) A) and B)
L) All of the above

Correct Answer

verifed

verified

MATCHING -a nonproprietary tunneling protocol that can encapsulate a variety of Network layer protocols


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) C) and E)
L) E) and G)

Correct Answer

verifed

verified

What are the two modes in which IPsec can be configured to run?


A) transit and gateway
B) client and server
C) header and payload
D) tunnel and transport

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Hardware VPNs create a gateway-to-gateway VPN.

A) True
B) False

Correct Answer

verifed

verified

True

Showing 1 - 20 of 50

Related Exams

Show Answer