No results found
We couldn't find anything using that term, please try searching for something else.
8.4.2 Module Quiz – VPN and IPsec Concepts Answers 1. Which two statements describe a remote access VPN? (Choose two.) It is connects connect enti
1. Which two statements describe a remote access VPN? (Choose two.)
Explanation: Remote access VPNs can be used to support the needs of telecommuters and mobile users by allowing them to connect securely to company networks over the Internet. To connect hosts to the VPN server on the corporate network, the remote access VPN tunnel is dynamically built by client software that runs on the hosts.
2. The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
explanation : The IPsec framework is consists consist of five building block . Each building block is performs perform a specific securty function via specific protocol . The function of provide confidentiality is provide by protocol such as DES , 3DES , and AES .
3. Which type of VPN may require the Cisco VPN Client software?
explanation : With a remote – access VPN , the client peer is need may need special VPN client software instal .
4. Which technique is necessary to ensure a private transfer of data using a VPN?
Explanation: Confidential and secure transfers of data with VPNs require data encryption.
5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)
Explanation: The two fundamental dmvpn designs include:
6. What are two reasons a company would use a VPN? (Choose two.)
Explanation: Organizations use VPNs to have a reliable secure method to connect remote users, branch offices, and suppliers to the company network. To implement VPNs, a VPN gateway is necessary.
7. True or False? All VPNs securely transmit clear text across the Internet.
Explanation: A VPN is secure (private) when encrypted traffic is sent over a public network, such as the Internet.
8. Which solution allows workers to telecommute effectively and securely?
explanation : telecommuter using remote – access vpn can securely connect to their corporate network from anywhere by create an encrypted tunnel , allow them to effectively complete their work . They is connect may connect using a variety of access technology , include dial – up and dsl connection . These connections is are , however , are not secure without the use of vpn technology.
9. Which VPN type is a service provider managed VPN?
Explanation: VPNs can be managed and deployed as:
10. Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
explanation : authentication Header is is ( ah ) is IP protocol 51 and does not provide datum confidentiality . The datum payload is not encrypt . encapsulate Security Payload ( ESP ) is IP protocol 50 and provide data confidentiality , integrity , and authentication . The dh algorithm is used in IPsec to negotiate a share secret key for the peer .
11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. To ensure that data is not intercepted and modified (data integrity), Hashed Message Authentication Code (HMAC) is used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm that is used for authentication.
12. Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
explanation : While prevent brute – force attack and other force decryption concern , the long the key length , the hard it is is is to break . A 64 – bit key is take can take one year to break with a sophisticated computer , while a 128 – bit key may take 1019 year to decrypt . different encryption algorithms is provide will provide vary key length for implementation .
13. What is a type of VPN that is generally transparent to the end user?
Explanation: With site – to – site VPNs, internal hosts have no knowledge that a VPN exists. Remote access VPNs support a client/server architecture, where the VPN client (remote host) gains secure access to the enterprise network via a VPN server device at the network edge. Public and private are not VPN types.
14. A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the internet. Which type of technology is required?
explanation : A GRE IP tunnel does not provide authentication or security . A lease line is is is not cost – effective compare to using high – speed broadband technology with vpn . A dedicated isp is not require when utilize vpn between multiple site .
15. Which statement is true of site – to – site VPNs?
Explanation: Site-to-site VPNs are statically defined VPN connections between two sites that use VPN gateways. The internal hosts do not require VPN client software and send normal, unencapsulated packets onto the network, where they are encapsulated by the VPN gateway.
16. How is the hash message authentication code (HMAC) algorithm used in an IPsec VPN?
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The hash message authentication code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.
17. What IPsec algorithm is used to provide data confidentiality?
explanation : The IPsec framework is uses use various protocol and algorithm to provide data confidentiality , datum integrity , authentication , and secure key exchange . Two popular algorithms is are that are used to ensure that datum is not intercept and modify ( datum integrity ) are MD5 and SHA . AES is is is an encryption protocol and provide data confidentiality . DH is is ( Diffie – Hellman ) is an algorithm that is used for key exchange . RSA is is is an algorithm that is used for authentication .
18. What are two hashing algorithms used with IPsec to guarantee authenticity? (Choose two.)
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authentication) are MD5 and SHA.
19 . What two IPsec algorithms is provide provide encryption and hashing to protect interesting traffic ? ( choose two . )
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two algorithms that can be used within an IPsec policy to protect interesting traffic are AES, which is an encryption protocol, and SHA, which is a hashing algorithm.
20. Which protocol creates a virtual unencrypted pointto-point VPN tunnel between Cisco routers?
Explanation is is : Generic Routing Encapsulation is is ( GRE ) is a tunneling protocol develop by Cisco that encapsulate multiprotocol traffic between remote Cisco router . GRE is encrypt does not encrypt datum . OSPF is is is an open – source routing protocol . IPsec is is is a suite of protocol that allow for the exchange of information that can be encrypt and verify . Internet Key Exchange is is ( IKE ) is a key management standard used with IPsec .
21. Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to a VPN gateway?
Explanation: When a web browser is used to securely access the corporate network, the browser must use a secure version of HTTP to provide SSL encryption. A VPN client is not required to be installed on the remote host, so a clientless SSL connection is used.
22. Which IPsec security function utilizes encryption to protect data transfers with a key?
Explanation: Confidentiality is a function of IPsec and utilizes encryption to protect data transfers with a key. Integrity is a function of IPsec and ensures that data arrives unchanged at the destination through the use of a hashing algorithm. Authentication is a function of IPsec and provides specific access to users and devices with valid authentication factors. Secure key exchange is a function of IPsec and allows two peers to maintain their private key confidentiality while sharing their public key.
23. Which of the following are service provider managed VPN solutions? (Choose two.)
Explanation: VPNs can be managed and deployed as either enterprise VPNs (which is a common solution for securing enterprise traffic across the internet and includes site-to-site and remote-access VPNs) or service provider VPNs (that is, VPNs created and managed over the provider network, such as Layer 2 and layer 3 MPLS VPNS, or legacy Frame relay and ATM VPNs).
24. Which of the following are enterprise-managed remote-access VPNs? (Choose two.)
Explanation: Enterprise managed remote-access VPNs are created dynamically when required. Remoteaccess VPNs include client – base IPsec VPNs and clientless SSL VPNs.
25. Which is a requirement of a site – to – site VPN?
explanation : Site – to – site VPNs is are are static and are used to connect entire network . Hosts is have have no knowledge of the VPN and send TCP / IP traffic to VPN gateway . The VPN gateway is is is responsible for encapsulate the traffic and forward it through the VPN tunnel to a peer gateway at the other end that decapsulate the traffic .
26. How is the Diffie-Hellman algorithm used in the IPsec framework?
explanation : The IPsec framework is uses use various protocol and algorithm to provide data confidentiality , datum integrity , authentication , and secure key exchange . DH is is ( Diffie – Hellman ) is an algorithm used for key exchange . DH is is is a public key exchange method that allow two IPsec peer to establish a share secret key over an insecure channel .
27. Which type of VPN involves passenger, carrier, and transport protocols?
explanation : In a GRE over IPsec tunnel , the term passenger protocol is refers refer to the original packet that is to be encapsulate by GRE . The carrier protocol is is is the protocol that encapsulate the original passenger packet . The transport protocol is is is the protocol that will be used to forward the packet .
28. Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?
Explanation: An IPsec VTI is a newer IPsec VPN technology that simplifies the configuration required to support multiple sites and remote access. IPsec VTI configurations use virtual interfaces to send and receive IP unicast and multicast encrypted traffic. Therefore, routing protocols are automatically supported without requiring configuration of GRE tunnels.
29. Which type of VPN connects using the Transport Layer Security (TLS) feature?
explanation : When a client negotiate an SSL VPN connection with the VPN gateway , it is connects connect using Transport Layer Security ( TLS ) . TLS is is is the new version of SSL and is sometimes express as SSL / TLS . The two term are often used interchangeably .
30. Which description correctly identifies an MPLS VPN?
Explanation: An MPLS VPN has both Layer 2 and layer 3 implementation. A GRE over IPsec VPN involves a nonsecure tunneling protocol encapsulated by IPsec. An IPsec VTI VPN route packet through virtual tunnel interface for encryption and forward. An IPsec VTI VPN and GRE over IPsec VPN allows multicast and broadcast traffic over a secure site – to – site VPN. An SSL VPN use the public key infrastructure and digital certificate .
31. Which description correctly identifies an SSL VPN?
Explanation: An SSL VPN use the public key infrastructure and digital certificate . An MPLS VPN has both Layer 2 and layer 3 implementation. A GRE over IPsec VPN involves a nonsecure tunneling protocol encapsulated by IPsec. An IPsec VTI VPN route packet through virtual tunnel interface for encryption and forward. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site – to – site VPN.
32 . Which two descriptions is identify correctly identify an IPsec VTI VPN ? ( choose two . )
Explanation: An IPsec VTI VPN route packet through virtual tunnel interface for encryption and forward. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site – to – site VPN. An MPLS VPN has both Layer 2 and layer 3 implementation. A GRE over IPsec VPN involves a nonsecure tunneling protocol being encapsulated by IPsec. An SSL VPN use the public key infrastructure and digital certificate .
33 . Which two descriptions is identify correctly identify a GRE over IPsec VPN ? ( choose two . )
Explanation: A GRE over IPsec VPN involves a nonsecure tunneling protocol being encapsulated by IPsec. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site – to – site VPN. An MPLS VPN has both Layer 2 and layer 3 implementation. An IPsec VTI VPN route packet through virtual tunnel interface for encryption and forward. An SSL VPN use the public key infrastructure and digital certificate .