Exam 11: VPN Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hardware VPNs create a gateway-to-gateway VPN.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

True

Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication?

Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
Verified

B

How is authentication implemented in a VPN?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

The type of authentication used in a VPN depends on the tunneling protocol.Many networks
use IPsec to authenticate users; VPN participants establish an SA and exchange keys to authenticate one another.PPTP,which is used for dial-up access to a remote server,uses MS-CHAP,in which both computers exchange authentication packets.TLS/SSL uses certificate-based authentication.RADIUS is also commonly used for authentication services in VPN architecture.
VPNs also use digital certificates to authenticate users and encryption to ensure that communications cannot be read even if they are intercepted in transit.

Which of the following is NOT an essential element of a VPN?

(Multiple Choice)
4.9/5
(42)

Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP?

(Multiple Choice)
4.9/5
(30)

MATCHING -a protocol developed by Netscape Communications Corporation as a way of enabling Web servers and browsers to exchange encrypted information

(Multiple Choice)
4.7/5
(29)

Network gateways are ____________ of the VPN connection.

(Short Answer)
4.9/5
(24)

Which of the following is true about using VPNs?

(Multiple Choice)
4.8/5
(37)

Which of the following is a disadvantage of putting the VPN on a firewall?

(Multiple Choice)
4.7/5
(28)

What are the two modes in which IPsec can be configured to run?

(Multiple Choice)
4.7/5
(35)

MATCHING -an IETF standard for secure authentication of requests for resource access

(Multiple Choice)
4.8/5
(30)

MATCHING -a nonproprietary tunneling protocol that can encapsulate a variety of Network layer protocols

(Multiple Choice)
4.9/5
(45)

List two advantages and two disadvantages of VPNs.

(Essay)
4.8/5
(38)

MATCHING -a digital token sent from the Authentication Server to the client

(Multiple Choice)
4.9/5
(32)

MATCHING -an IPsec protocol that encrypts the header and data components of TCP/IP packets

(Multiple Choice)
4.8/5
(24)

Which IPsec component is software that handles the tasks of encrypting,authenticating, decrypting,and checking packets?

(Multiple Choice)
4.8/5
(29)

What is AES and why is AES a better encryption method to use compared to DES?

(Essay)
4.8/5
(28)

If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.

(True/False)
4.7/5
(45)

Which of the following is NOT a factor a secure VPN design should address?

(Multiple Choice)
4.8/5
(33)

Which of the following is true about software VPNs?

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)