Exam 10: Setting up a Virtual Private Network
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Describe the mesh configuration for a VPN.
Free
(Essay)
4.7/5
(41)
Correct Answer:
In a mesh configuration, each participant (i.e., network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.In configuring the VPN, you need to specifically identify each of these participants to every other participant that uses the VPN.Before initiating a connection, each VPN hardware or software terminator checks its routing table or SA table to see if the other participant has an SA with it.
Match each item with a statement below.
-Services purchased from a service provider that give the user dedicated use of a predefined bandwidth or data rate.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
F
Match each item with a statement below.
-Makes a network accessible to remote users who need dial-in access.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
Match each item with a statement below.
-The device connecting the organization's networks and equipment to the Internet.
(Multiple Choice)
4.9/5
(31)
____ authentication adds something the user possesses, such as a token or smart card, and something physically associated with the user, such as fingerprints or retinal scans.
(Multiple Choice)
4.8/5
(26)
Match each item with a statement below.
-Commonly used by remote users who need to connect to a network using a dial-in modem connection.
(Multiple Choice)
4.8/5
(34)
In configuring the VPN for a ____ configuration, you need to specifically identify each of these participants to every other participant that uses the VPN.
(Multiple Choice)
4.9/5
(29)
Match each item with a statement below.
-The host encrypts traffic when it is generated; the data part of packets is encrypted, but not the headers.
(Multiple Choice)
4.8/5
(38)
VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.
(Multiple Choice)
4.8/5
(36)
The problem with ____ VPNs is that the requirement that all communications flow into and out of the central router slows down communications.
(Multiple Choice)
4.9/5
(35)
Match each item with a statement below.
-Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another.
(Multiple Choice)
4.9/5
(39)
Encapsulating IP packets within other packets hides the source and destination information of the encapsulated packets.
(True/False)
4.8/5
(31)
When testing a VPN client, if the user experiences errors, he or she should ____.
(Multiple Choice)
4.8/5
(28)
Each end of the VPN represents an extension of your organizational network to a new location; you are creating a(n) ____.
(Multiple Choice)
4.9/5
(37)
A part of IP Masquerade, called ____, enables remote users to connect to the Linux-based firewall using either PPTP or IPSec.
(Multiple Choice)
4.9/5
(34)
____________________ mode of IPSec is used to provide secure communications between hosts over any range of IP addresses.
(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)