Deck 10: Setting up a Virtual Private Network

Full screen (f)
exit full mode
Question
____ is a standard for secure encrypted communications developed by the Internet Engineering Task Force (IETF).

A) IPSec
B) IKE
C) PPTP
D) L2TP
Use Space or
up arrow
down arrow
to flip the card.
Question
Each end of the VPN represents an extension of your organizational network to a new location; you are creating a(n) ____.

A) Internet
B) private domain
C) intranet
D) extranet
Question
L2TP uses ____ rather than MPPE to encrypt data sent over PPP.

A) SSL
B) SSH
C) IPSec
D) IKE
Question
____ authentication adds something the user possesses, such as a token or smart card, and something physically associated with the user, such as fingerprints or retinal scans.

A) Secured
B) Multifactor
C) VPN
D) Certificate
Question
For fast-growing networks, a ____ configuration is preferable.

A) mesh
B) hub-and-spoke
C) inter-connected
D) client
Question
A VPN connection occurs within the context of a HTTP tunnel.
Question
VPN endpoints provide ____ and encapsulation of data.

A) encryption
B) authentication
C) routing
D) tunneling
Question
An increasingly popular alternative for remote access to Web-enabled applications is ____-based VPNs.

A) network
B) PPP
C) SSL
D) HTTP
Question
VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.

A) a port number
B) IP source and destination information
C) a user name
D) a protocol
Question
VPNs can be used to give parts of your own organization access to other parts through an organizational ____.

A) Internet
B) private domain
C) intranet
D) extranet
Question
____ provides for the exchange of public and private keys.

A) L2TP
B) PPTP
C) IKE
D) PPP over SSH
Question
In ____ mode, the concentrator acts as a hardware device enabling a secure site-to-site VPN connection.

A) network extension
B) client
C) server
D) mixed
Question
In configuring the VPN for a ____ configuration, you need to specifically identify each of these participants to every other participant that uses the VPN.

A) mesh
B) hub-and-spoke
C) inter-connected
D) client
Question
The problem with ____ VPNs is that the requirement that all communications flow into and out of the central router slows down communications.

A) mesh
B) hub-and-spoke
C) centralized
D) hardware
Question
A VPN ____ is an alternative to using a general-purpose hardware device.

A) router
B) appliance
C) firewall
D) protocol
Question
Due to a lack of common standards, it is difficult, if not impossible, to operate a VPN that uses systems from different vendors.
Question
PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.
Question
Encapsulating IP packets within other packets hides the source and destination information of the encapsulated packets.
Question
The problem with mesh VPNs is that the requirement that all communications flow into and out of the central router slows down communications.
Question
Some VPNs use the term encryption ____ to describe everything in the protected network and behind the gateway.

A) network
B) trust
C) sector
D) domain
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
VPN that links two or more networks.
Question
____________________ is a computer networking philosophy and a related set of protocols that are together used to evaluate the trustworthiness of a client wishing to join a network.
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Makes a network accessible to remote users who need dial-in access.
Question
Most VPN concentrator appliances give users the choice of operating in one of two modes: ____________________ mode or network extension mode.
Question
A part of IP Masquerade, called ____, enables remote users to connect to the Linux-based firewall using either PPTP or IPSec.

A) IPSec Masquerade
B) VPNSec
C) Windows 7
D) VPN Masquerade
Question
Routers that support IPSec can be set up at the perimeter of the LANs to be connected; these are sometimes called IPSec ____________________.
Question
A(n) ____________________ tunnel is a communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another, just like any other TCP/IP data transmission.
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The device connecting the organization's networks and equipment to the Internet.
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The traffic is encrypted and decrypted in transit, somewhere between the source computer that generated it and its destination.
Question
To enable a remote user to connect to a VPN, ____.

A) the user must come into the office and use his or her work computer
B) you must provide the user with a digital certificate
C) you need to provide a computer to the user
D) you need to issue VPN client software to that user
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Inclusion of one data structure inside another data structure.
Question
Making two connections over a VPN line is called ____.

A) IP Masquerade
B) packet filtering
C) split tunneling
D) split endpoints
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Commonly used by remote users who need to connect to a network using a dial-in modem connection.
Question
A(n) ____ is essential for identifying who can use the VPN and for ensuring that all users know what constitutes proper use of the VPN.

A) VPN client
B) encrypted authentication
C) VPN policy
D) digital signature
Question
____________________ mode of IPSec is used to provide secure communications between hosts over any range of IP addresses.
Question
When testing a VPN client, if the user experiences errors, he or she should ____.

A) disconnect from the VPN and use a different password
B) use a different VPN client
C) delete the errors and try again
D) write down or report the error message exactly to help you correctly diagnose the problem
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The host encrypts traffic when it is generated; the data part of packets is encrypted, but not the headers.
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another.
Question
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Services purchased from a service provider that give the user dedicated use of a predefined bandwidth or data rate.
Question
Incoming PPTP connections arrive on TCP port ____.

A) 23
B) 1113
C) 1723
D) 2123
Question
How is the encryption of the data payload accomplished on a VPN?
Question
Describe software VPN systems.
Question
Describe the mesh configuration for a VPN.
Question
Describe the drawbacks of VPNs.
Question
Describe the features of IP encapsulation provided by a VPN.
Question
What is L2TP?
Question
Describe the hub-and-spoke configuration of a VPN.
Question
What are VPN endpoints?
Question
List some devices that can form the endpoints of the VPN.
Question
What should be specified in a VPN security policy?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Setting up a Virtual Private Network
1
____ is a standard for secure encrypted communications developed by the Internet Engineering Task Force (IETF).

A) IPSec
B) IKE
C) PPTP
D) L2TP
A
2
Each end of the VPN represents an extension of your organizational network to a new location; you are creating a(n) ____.

A) Internet
B) private domain
C) intranet
D) extranet
D
3
L2TP uses ____ rather than MPPE to encrypt data sent over PPP.

A) SSL
B) SSH
C) IPSec
D) IKE
C
4
____ authentication adds something the user possesses, such as a token or smart card, and something physically associated with the user, such as fingerprints or retinal scans.

A) Secured
B) Multifactor
C) VPN
D) Certificate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
For fast-growing networks, a ____ configuration is preferable.

A) mesh
B) hub-and-spoke
C) inter-connected
D) client
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A VPN connection occurs within the context of a HTTP tunnel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
VPN endpoints provide ____ and encapsulation of data.

A) encryption
B) authentication
C) routing
D) tunneling
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
An increasingly popular alternative for remote access to Web-enabled applications is ____-based VPNs.

A) network
B) PPP
C) SSL
D) HTTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.

A) a port number
B) IP source and destination information
C) a user name
D) a protocol
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
VPNs can be used to give parts of your own organization access to other parts through an organizational ____.

A) Internet
B) private domain
C) intranet
D) extranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
____ provides for the exchange of public and private keys.

A) L2TP
B) PPTP
C) IKE
D) PPP over SSH
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
In ____ mode, the concentrator acts as a hardware device enabling a secure site-to-site VPN connection.

A) network extension
B) client
C) server
D) mixed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In configuring the VPN for a ____ configuration, you need to specifically identify each of these participants to every other participant that uses the VPN.

A) mesh
B) hub-and-spoke
C) inter-connected
D) client
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The problem with ____ VPNs is that the requirement that all communications flow into and out of the central router slows down communications.

A) mesh
B) hub-and-spoke
C) centralized
D) hardware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A VPN ____ is an alternative to using a general-purpose hardware device.

A) router
B) appliance
C) firewall
D) protocol
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Due to a lack of common standards, it is difficult, if not impossible, to operate a VPN that uses systems from different vendors.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Encapsulating IP packets within other packets hides the source and destination information of the encapsulated packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The problem with mesh VPNs is that the requirement that all communications flow into and out of the central router slows down communications.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Some VPNs use the term encryption ____ to describe everything in the protected network and behind the gateway.

A) network
B) trust
C) sector
D) domain
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
VPN that links two or more networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
____________________ is a computer networking philosophy and a related set of protocols that are together used to evaluate the trustworthiness of a client wishing to join a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Makes a network accessible to remote users who need dial-in access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Most VPN concentrator appliances give users the choice of operating in one of two modes: ____________________ mode or network extension mode.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A part of IP Masquerade, called ____, enables remote users to connect to the Linux-based firewall using either PPTP or IPSec.

A) IPSec Masquerade
B) VPNSec
C) Windows 7
D) VPN Masquerade
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Routers that support IPSec can be set up at the perimeter of the LANs to be connected; these are sometimes called IPSec ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____________________ tunnel is a communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another, just like any other TCP/IP data transmission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The device connecting the organization's networks and equipment to the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The traffic is encrypted and decrypted in transit, somewhere between the source computer that generated it and its destination.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
To enable a remote user to connect to a VPN, ____.

A) the user must come into the office and use his or her work computer
B) you must provide the user with a digital certificate
C) you need to provide a computer to the user
D) you need to issue VPN client software to that user
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Inclusion of one data structure inside another data structure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Making two connections over a VPN line is called ____.

A) IP Masquerade
B) packet filtering
C) split tunneling
D) split endpoints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Commonly used by remote users who need to connect to a network using a dial-in modem connection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ____ is essential for identifying who can use the VPN and for ensuring that all users know what constitutes proper use of the VPN.

A) VPN client
B) encrypted authentication
C) VPN policy
D) digital signature
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ mode of IPSec is used to provide secure communications between hosts over any range of IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
When testing a VPN client, if the user experiences errors, he or she should ____.

A) disconnect from the VPN and use a different password
B) use a different VPN client
C) delete the errors and try again
D) write down or report the error message exactly to help you correctly diagnose the problem
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
The host encrypts traffic when it is generated; the data part of packets is encrypted, but not the headers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each item with a statement below.
a.encapsulation
b.tunnel
c.client-to-site
d.transport mode
e.gateway
f.private leased lines
g.tunnel mode
h.site-to-site
i.Point-to-Point Tunneling Protocol
Services purchased from a service provider that give the user dedicated use of a predefined bandwidth or data rate.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Incoming PPTP connections arrive on TCP port ____.

A) 23
B) 1113
C) 1723
D) 2123
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
How is the encryption of the data payload accomplished on a VPN?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe software VPN systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the mesh configuration for a VPN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe the drawbacks of VPNs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe the features of IP encapsulation provided by a VPN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is L2TP?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the hub-and-spoke configuration of a VPN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What are VPN endpoints?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
List some devices that can form the endpoints of the VPN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What should be specified in a VPN security policy?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.