Filters
Question type

Study Flashcards

Which of the following is NOT true about a hardware VPN?


A) should be the first choice for fast-growing networks
B) can handle more traffic than software VPNs
C) have more security vulnerabilities than software VPNs
D) create a gateway-to-gateway VPN

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Define virtual private network.

Correct Answer

verifed

verified

A virtual private network (VPN)provides ...

View Answer

_________________ based VPNs are appropriate when the endpoints are controlled by different organizations and network administrators.

Correct Answer

verifed

verified

MATCHING -an IPsec protocol that provides authentication of TCP/IP packets to ensure data integrity


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) A) and H)
L) G) and H)

Correct Answer

verifed

verified

Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet?


A) PPTP
B) L2TP
C) IPsec
D) SSL

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

MATCHING -Kerberos component that holds secret keys for users,applications,services,or resources


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) G) and J)
L) C) and F)

Correct Answer

verifed

verified

The Internet Key ______________ protocol enables computers to make an SA.

Correct Answer

verifed

verified

Which of the following is an improvement of TLS over SSL?


A) requires less processing power
B) uses a single hashing algorithm for all the data
C) uses only asymmetric encryption
D) adds a hashed message authentication code

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

MATCHING -a form of key exchange used to encrypt and decrypt data as it passes through a VPN tunnel


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) B) and E)
L) C) and F)

Correct Answer

verifed

verified

What four events occur when one IPsec-compliant computer connects to another?

Correct Answer

verifed

verified

1.The IPsec driver and ISAKMP retrieve t...

View Answer

Standards and protocols used in VPNs are in their infancy and seldom used.

A) True
B) False

Correct Answer

verifed

verified

TLS splits the input data in half and recombines it using a(n)___________ function.

Correct Answer

verifed

verified

Briefly describe the L2TP protocol.

Correct Answer

verifed

verified

Layer 2 Tunneling Protocol (L2TP)is base...

View Answer

Another name for a VPN connection is tunnel.

A) True
B) False

Correct Answer

verifed

verified

List four standard VPN protocols.

Correct Answer

verifed

verified

IPsec
PPTP...

View Answer

Which VPN protocol leverages Web-based applications?


A) PPTP
B) L2TP
C) SSL
D) IPsec

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What was created to address the problem of remote clients not meeting an organization's VPN security standards?


A) split tunneling
B) VPN quarantine
C) IPsec filters
D) GRE isolation

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which IPsec component authenticates TCP/IP packets to ensure data integrity?


A) AH
B) ESP
C) IKE
D) ISAKMP

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

While the AH ensures data integrity,confidentiality of data is provided by the __________ component of IPsec.

Correct Answer

verifed

verified

ESP
encaps...

View Answer

List two reasons IPsec has become the standard set of protocols for VPN security.

Correct Answer

verifed

verified

IPsec works at Layer 3 and provides a ty...

View Answer

Showing 21 - 40 of 50

Related Exams

Show Answer