Deck 7: Virtual Private Networks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
Play
Full screen (f)
Deck 7: Virtual Private Networks
1
What is a hash function?
A)A password encryption method using a variable mathematical equation
B)A secure encryption key determined by a mathematical calculation on the password
C)The mathematical transformation of a variable-sized input that returns a fixed-length string
D)The transformation of an encrypted variable-length password by a mathematical string
A)A password encryption method using a variable mathematical equation
B)A secure encryption key determined by a mathematical calculation on the password
C)The mathematical transformation of a variable-sized input that returns a fixed-length string
D)The transformation of an encrypted variable-length password by a mathematical string
C
2
Which is NOT part of basic VPN capability?
A)Circuit-switched connection over the Internet
B)Encryption and decryption of data
C)Encapsulation and tunneling
D)User authentication and access control
A)Circuit-switched connection over the Internet
B)Encryption and decryption of data
C)Encapsulation and tunneling
D)User authentication and access control
A
3
The part of a VPN connection in which the data is encapsulated is called a(n)____________.
tunnel
4
What is a virtual private network?
A)A method for remote users to connect to a network via a leased line
B)A method for Internet users to connect to a network via a dedicated line
C)A method for users at other sites to connect to a private network via the Internet
D)A method for a remote office to connect to a private network via a leased line
A)A method for remote users to connect to a network via a leased line
B)A method for Internet users to connect to a network via a dedicated line
C)A method for users at other sites to connect to a private network via the Internet
D)A method for a remote office to connect to a private network via a leased line
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
Which is NOT true about development of IPSec?
A)IPSec is built into Windows operating systems such as Windows XP Internet Connection Firewall.
B)IPSec requires sending and receiving devices to share a single encryption key.
C)IPSec provides two encryption modes and no additional protocols for encrypting data.
D)IPSec was developed by the IETF to support secure exchange of packets.
A)IPSec is built into Windows operating systems such as Windows XP Internet Connection Firewall.
B)IPSec requires sending and receiving devices to share a single encryption key.
C)IPSec provides two encryption modes and no additional protocols for encrypting data.
D)IPSec was developed by the IETF to support secure exchange of packets.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
What encryption technology is used by the module offered by Cisco to provide VPN capability with Cisco switches and routers?
A)3DES
B)AES
C)DES
D)IPSec
A)3DES
B)AES
C)DES
D)IPSec
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
Which is NOT true about L2TP technology?
A)It is based on a combination of PPTP and Cisco's layer 2 forwarding protocol.
B)It is supported by all versions of Windows since NT.
C)It works only with public IP addresses.
D)It can use IPSec for encryption.
A)It is based on a combination of PPTP and Cisco's layer 2 forwarding protocol.
B)It is supported by all versions of Windows since NT.
C)It works only with public IP addresses.
D)It can use IPSec for encryption.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
Which is an authentication protocol that uses a three-part handshaking procedure?
A)CHAP
B)EAP
C)PAP
D)SPAP
A)CHAP
B)EAP
C)PAP
D)SPAP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
Which was the earlier VPN technology?
A)IPSec
B)L2TP
C)PPP
D)PPTP
A)IPSec
B)L2TP
C)PPP
D)PPTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
Which is NOT likely a consideration of an administrator in determining which VPN solution to implement?
A)How packets are encrypted
B)What authentication is used
C)Whether existing hardware and software supports the technology
D)Which ISPs offer which services
A)How packets are encrypted
B)What authentication is used
C)Whether existing hardware and software supports the technology
D)Which ISPs offer which services
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
Which common VPN technology supports five authentication methods?
A)IPSec
B)L2TP
C)PPP
D)PPTP
A)IPSec
B)L2TP
C)PPP
D)PPTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
Which is a very basic authentication protocol that transmits passwords in unencrypted clear text?
A)CHAP
B)EAP
C)PAP
D)SPAP
A)CHAP
B)EAP
C)PAP
D)SPAP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
To serve its purpose,a(n)____________ allows a remote user to connect to a private network just as if he were at a local client inside the network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
Which is true of a virtual private network?
A)It connects via a private network connection.
B)It emulates a direct network connection.
C)It is faster than a typical broadband connection.
D)It utilizes inexpensive leased lines.
A)It connects via a private network connection.
B)It emulates a direct network connection.
C)It is faster than a typical broadband connection.
D)It utilizes inexpensive leased lines.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
Which IPSec mode enables encryption of the header and data during a VPN connection?
A)Point-to-point encryption mode
B)Transport mode
C)Tunnel mode
D)VPN encryption mode
A)Point-to-point encryption mode
B)Transport mode
C)Tunnel mode
D)VPN encryption mode
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
Which is NOT true about MS-CHAP?
A)It was designed to integrate with encryption and hashing algorithms of Microsoft Windows.
B)It requires the authenticator to store a reversibly encrypted password.
C)It defines a set of reason-for-failure codes readable by Microsoft Windows.
D)It does not require clear-text passwords to be stored by the authenticator.
A)It was designed to integrate with encryption and hashing algorithms of Microsoft Windows.
B)It requires the authenticator to store a reversibly encrypted password.
C)It defines a set of reason-for-failure codes readable by Microsoft Windows.
D)It does not require clear-text passwords to be stored by the authenticator.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
What makes SPAP susceptible to fraudulent login attacks via a recorded authentication exchange?
A)SPAP does not encrypt the username and password.
B)SPAP uses weak encryption that is easily decrypted.
C)SPAP uses the same reversible encryption method every time.
D)SPAP transmits the decryption key during the exchange.
A)SPAP does not encrypt the username and password.
B)SPAP uses weak encryption that is easily decrypted.
C)SPAP uses the same reversible encryption method every time.
D)SPAP transmits the decryption key during the exchange.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
Which authentication method was designed specifically for PPTP?
A)Challenge Handshake Authentication Protocol
B)Extensible Authentication Protocol
C)Password Authentication Protocol
D)Shiva Password Authentication Protocol
A)Challenge Handshake Authentication Protocol
B)Extensible Authentication Protocol
C)Password Authentication Protocol
D)Shiva Password Authentication Protocol
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
At what layer of the OSI model does PPTP work?
A)Layer 1
B)Layer 2
C)Layer 3
D)Layers 2 and 3
A)Layer 1
B)Layer 2
C)Layer 3
D)Layers 2 and 3
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
What two types of tunneling are supported by PPTP?
A)Compulsory and voluntary
B)Encapsulated and non-encapsulated
C)Mandatory and optional
D)Point-to-point and layer 2
A)Compulsory and voluntary
B)Encapsulated and non-encapsulated
C)Mandatory and optional
D)Point-to-point and layer 2
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
____________ tunneling protocol is an older VPN protocol sometimes considered less secure than newer ones.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
IPSec uses Internet ____________ to manage the encryption keys.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
One strength of available PPTP authentication technologies is that in addition to the initial handshaking,____________ also periodically repeats the handshake process.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Prior to encryption,IPSec compresses packets with ____________ compression.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
In a(n)____________ attack,the attacker records the actual transmission of a username and password in order to use the recording later to gain fraudulent access.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
A PPTP tunneling capability that begins with a PPP dial-up and then permits the remote client to choose whether to launch a secure VPN session is called ____________ tunneling.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck