Exam 10: Setting up a Virtual Private Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How is the encryption of the data payload accomplished on a VPN?

(Essay)
4.8/5
(33)

A VPN connection occurs within the context of a HTTP tunnel.

(True/False)
4.9/5
(26)

In ____ mode, the concentrator acts as a hardware device enabling a secure site-to-site VPN connection.

(Multiple Choice)
4.7/5
(34)

Due to a lack of common standards, it is difficult, if not impossible, to operate a VPN that uses systems from different vendors.

(True/False)
4.8/5
(30)

A(n) ____________________ tunnel is a communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another, just like any other TCP/IP data transmission.

(Short Answer)
4.9/5
(39)

An increasingly popular alternative for remote access to Web-enabled applications is ____-based VPNs.

(Multiple Choice)
4.8/5
(35)

The problem with mesh VPNs is that the requirement that all communications flow into and out of the central router slows down communications.

(True/False)
4.9/5
(32)

Routers that support IPSec can be set up at the perimeter of the LANs to be connected; these are sometimes called IPSec ____________________.

(Short Answer)
4.8/5
(27)

For fast-growing networks, a ____ configuration is preferable.

(Multiple Choice)
5.0/5
(33)

PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.

(True/False)
4.9/5
(29)

VPNs can be used to give parts of your own organization access to other parts through an organizational ____.

(Multiple Choice)
4.8/5
(26)

What is L2TP?

(Essay)
4.8/5
(48)

L2TP uses ____ rather than MPPE to encrypt data sent over PPP.

(Multiple Choice)
4.8/5
(37)

VPN endpoints provide ____ and encapsulation of data.

(Multiple Choice)
4.7/5
(33)

Match each item with a statement below. -The traffic is encrypted and decrypted in transit, somewhere between the source computer that generated it and its destination.

(Multiple Choice)
4.9/5
(30)

A VPN ____ is an alternative to using a general-purpose hardware device.

(Multiple Choice)
4.9/5
(42)

Describe the drawbacks of VPNs.

(Essay)
4.7/5
(32)

____ provides for the exchange of public and private keys.

(Multiple Choice)
4.8/5
(25)

Most VPN concentrator appliances give users the choice of operating in one of two modes: ____________________ mode or network extension mode.

(Short Answer)
4.8/5
(33)

A(n) ____ is essential for identifying who can use the VPN and for ensuring that all users know what constitutes proper use of the VPN.

(Multiple Choice)
4.9/5
(29)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)