CCNA 4 Chapter 7: Securing Site-to-Site Connectivity Flashcards
How is “tunneling” accomplished in a VPN?
New headers from one or more VPN protocols encapsulate the original packets.
Which two scenarios are examples of remote access VPNs? (Choose two.).
- A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
- An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?
172.16.1.2
Which statement correctly describes IPsec?
IPsec works at Layer 3, but can protect traffic from Layer 4 through Layer 7.
What is an IPsec protocol that provides data confidentiality and authentication for IP packets?
ESP
Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)
- IPsec uses encryption algorithms and keys to provide secure transfer of data
- IPsec uses secret key cryptography to encrypt messages that are sent through a VPN.
- IPsec uses ESP to provide confidential transfer of data by encrypting IP packets.
What key question would help determine whether an organization should use an SSL VPN or an IPsec VPN for the remote access solution of the organization?
Do users need to be able to connect without requiring special VPN software?
What is the purpose of a message hash in a VPN connection?
It ensures that the data has not changed while in transit.
A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. Which type of technology is required?
a VPN gateway
What is one benefit of using VPNs for remote access?
potential for reduced connectivity costs
Which statement describes a characteristic of IPsec VPNs?
IPsec works with all Layer 2 protocols
What is the purpose of the generic routing encapsulation tunneling protocol?
to manage the transportation of IP multicast and multiprotocol traffic between remote sites
Which algorithm is an asymmetrical key cryptosystem?
RSA
A network design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would provide the strongest level of message integrity?
512-bit SHA
What two encryption algorithms are used in IPsec VPNs? (Choose two.)
- . 3DES
2. AES