Exam 10: Setting up a Virtual Private Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe the mesh configuration for a VPN.

Free
(Essay)
4.7/5
(41)
Correct Answer:
Verified

In a mesh configuration, each participant (i.e., network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.In configuring the VPN, you need to specifically identify each of these participants to every other participant that uses the VPN.Before initiating a connection, each VPN hardware or software terminator checks its routing table or SA table to see if the other participant has an SA with it.

Match each item with a statement below. -Services purchased from a service provider that give the user dedicated use of a predefined bandwidth or data rate.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

F

Match each item with a statement below. -Makes a network accessible to remote users who need dial-in access.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

What are VPN endpoints?

(Essay)
4.9/5
(34)

Match each item with a statement below. -The device connecting the organization's networks and equipment to the Internet.

(Multiple Choice)
4.9/5
(31)

____ authentication adds something the user possesses, such as a token or smart card, and something physically associated with the user, such as fingerprints or retinal scans.

(Multiple Choice)
4.8/5
(26)

Match each item with a statement below. -Commonly used by remote users who need to connect to a network using a dial-in modem connection.

(Multiple Choice)
4.8/5
(34)

In configuring the VPN for a ____ configuration, you need to specifically identify each of these participants to every other participant that uses the VPN.

(Multiple Choice)
4.9/5
(29)

Match each item with a statement below. -The host encrypts traffic when it is generated; the data part of packets is encrypted, but not the headers.

(Multiple Choice)
4.8/5
(38)

Making two connections over a VPN line is called ____.

(Multiple Choice)
4.9/5
(27)

Describe the features of IP encapsulation provided by a VPN.

(Essay)
4.8/5
(32)

VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.

(Multiple Choice)
4.8/5
(36)

The problem with ____ VPNs is that the requirement that all communications flow into and out of the central router slows down communications.

(Multiple Choice)
4.9/5
(35)

What should be specified in a VPN security policy?

(Essay)
4.8/5
(35)

Match each item with a statement below. -Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another.

(Multiple Choice)
4.9/5
(39)

Encapsulating IP packets within other packets hides the source and destination information of the encapsulated packets.

(True/False)
4.8/5
(31)

When testing a VPN client, if the user experiences errors, he or she should ____.

(Multiple Choice)
4.8/5
(28)

Each end of the VPN represents an extension of your organizational network to a new location; you are creating a(n) ____.

(Multiple Choice)
4.9/5
(37)

A part of IP Masquerade, called ____, enables remote users to connect to the Linux-based firewall using either PPTP or IPSec.

(Multiple Choice)
4.9/5
(34)

____________________ mode of IPSec is used to provide secure communications between hosts over any range of IP addresses.

(Short Answer)
4.8/5
(38)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)