Exam 11: VPN Concepts
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
Hardware VPNs create a gateway-to-gateway VPN.
Free
(True/False)
4.8/5
(34)
Correct Answer:
True
Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication?
Free
(Multiple Choice)
4.9/5
(24)
Correct Answer:
B
How is authentication implemented in a VPN?
Free
(Essay)
4.8/5
(38)
Correct Answer:
The type of authentication used in a VPN depends on the tunneling protocol.Many networks
use IPsec to authenticate users; VPN participants establish an SA and exchange keys to authenticate one another.PPTP,which is used for dial-up access to a remote server,uses MS-CHAP,in which both computers exchange authentication packets.TLS/SSL uses certificate-based authentication.RADIUS is also commonly used for authentication services in VPN architecture.
VPNs also use digital certificates to authenticate users and encryption to ensure that communications cannot be read even if they are intercepted in transit.
Which of the following is NOT an essential element of a VPN?
(Multiple Choice)
4.9/5
(42)
Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP?
(Multiple Choice)
4.9/5
(30)
MATCHING
-a protocol developed by Netscape Communications Corporation as a way of enabling Web servers and browsers to exchange encrypted information
(Multiple Choice)
4.7/5
(29)
Which of the following is a disadvantage of putting the VPN on a firewall?
(Multiple Choice)
4.7/5
(28)
What are the two modes in which IPsec can be configured to run?
(Multiple Choice)
4.7/5
(35)
MATCHING
-an IETF standard for secure authentication of requests for resource access
(Multiple Choice)
4.8/5
(30)
MATCHING
-a nonproprietary tunneling protocol that can encapsulate a variety of Network layer protocols
(Multiple Choice)
4.9/5
(45)
MATCHING
-a digital token sent from the Authentication Server to the client
(Multiple Choice)
4.9/5
(32)
MATCHING
-an IPsec protocol that encrypts the header and data components of TCP/IP packets
(Multiple Choice)
4.8/5
(24)
Which IPsec component is software that handles the tasks of encrypting,authenticating, decrypting,and checking packets?
(Multiple Choice)
4.8/5
(29)
What is AES and why is AES a better encryption method to use compared to DES?
(Essay)
4.8/5
(28)
If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.
(True/False)
4.7/5
(45)
Which of the following is NOT a factor a secure VPN design should address?
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)