Exam 10: Setting up a Virtual Private Network
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
In ____ mode, the concentrator acts as a hardware device enabling a secure site-to-site VPN connection.
(Multiple Choice)
4.7/5
(34)
Due to a lack of common standards, it is difficult, if not impossible, to operate a VPN that uses systems from different vendors.
(True/False)
4.8/5
(30)
A(n) ____________________ tunnel is a communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another, just like any other TCP/IP data transmission.
(Short Answer)
4.9/5
(39)
An increasingly popular alternative for remote access to Web-enabled applications is ____-based VPNs.
(Multiple Choice)
4.8/5
(35)
The problem with mesh VPNs is that the requirement that all communications flow into and out of the central router slows down communications.
(True/False)
4.9/5
(32)
Routers that support IPSec can be set up at the perimeter of the LANs to be connected; these are sometimes called IPSec ____________________.
(Short Answer)
4.8/5
(27)
For fast-growing networks, a ____ configuration is preferable.
(Multiple Choice)
5.0/5
(33)
PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.
(True/False)
4.9/5
(29)
VPNs can be used to give parts of your own organization access to other parts through an organizational ____.
(Multiple Choice)
4.8/5
(26)
L2TP uses ____ rather than MPPE to encrypt data sent over PPP.
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below.
-The traffic is encrypted and decrypted in transit, somewhere between the source computer that generated it and its destination.
(Multiple Choice)
4.9/5
(30)
A VPN ____ is an alternative to using a general-purpose hardware device.
(Multiple Choice)
4.9/5
(42)
Most VPN concentrator appliances give users the choice of operating in one of two modes: ____________________ mode or network extension mode.
(Short Answer)
4.8/5
(33)
A(n) ____ is essential for identifying who can use the VPN and for ensuring that all users know what constitutes proper use of the VPN.
(Multiple Choice)
4.9/5
(29)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)