CCNA 4 Chapter 7: Securing Site-to-Site Connectivity Flashcards

1
Q

How is “tunneling” accomplished in a VPN?

A

New headers from one or more VPN protocols encapsulate the original packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two scenarios are examples of remote access VPNs? (Choose two.).

A
  1. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
  2. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?

A

172.16.1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement correctly describes IPsec?

A

IPsec works at Layer 3, but can protect traffic from Layer 4 through Layer 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an IPsec protocol that provides data confidentiality and authentication for IP packets?

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)

A
  1. IPsec uses encryption algorithms and keys to provide secure transfer of data
  2. IPsec uses secret key cryptography to encrypt messages that are sent through a VPN.
  3. IPsec uses ESP to provide confidential transfer of data by encrypting IP packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key question would help determine whether an organization should use an SSL VPN or an IPsec VPN for the remote access solution of the organization?

A

Do users need to be able to connect without requiring special VPN software?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a message hash in a VPN connection?

A

It ensures that the data has not changed while in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. Which type of technology is required?

A

a VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one benefit of using VPNs for remote access?

A

potential for reduced connectivity costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement describes a characteristic of IPsec VPNs?

A

IPsec works with all Layer 2 protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the generic routing encapsulation tunneling protocol?

A

to manage the transportation of IP multicast and multiprotocol traffic between remote sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which algorithm is an asymmetrical key cryptosystem?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would provide the strongest level of message integrity?

A

512-bit SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What two encryption algorithms are used in IPsec VPNs? (Choose two.)

A
  1. . 3DES

2. AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement describes a feature of site-to-site VPNs?

A

Internal hosts send normal, un-encapsulated packets.

17
Q

Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?

A

clientless SSL VPN

18
Q

Which two algorithms use Hash-based Message Authentication Code for message authentication? (Choose two.)

A
  1. MD5

2. SHA

19
Q

Which function of IPsec security services allows the receiver to verify that the data was transmitted without being changed or altered in any way?

A

data integrity

20
Q

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is preventing the hosts from communicating across the VPN tunnel?

A

The tunnel IP addresses are incorrect.

21
Q

What is the purpose of utilizing Diffie-Hellman (DH) algorithms as part of the IPsec standard?

A

DH algorithms allow two parties to establish a shared secret key that is used by encryption and hash algorithms.

22
Q

Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)

A
  1. The data that is sent across this tunnel is not secure.

2. A GRE tunnel is being used.

23
Q

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

A

site-to-site VPN

24
Q

Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?

A

a central site that connects to a SOHO site without encryption