CCNA Chapter 8 Online Flashcards
What are two benefits of an SSL VPN? (Choose two.)
- It has the option of only requiring an SSL-enabled web browser.
- It is compatible with DMVPNs, Cisco IOS Firewall, IPsec, IPS, Cisco Easy VPN, and NAT.
When verifying IPsec configurations, which show command displays the encryption algorithm, hash algorithm, authentication method, and Diffie-Hellman group configured, as well as default settings?
show crypto isakmp policy
When configuring a site-to-site IPsec VPN using the CLI, the authentication pre-share command is configured in the ISAKMP policy. Which additional peer authentication configuration is required?
Configure a PSK with the crypto isakmp key global configuration command.
Which action do IPsec peers take during the IKE Phase 2 exchange?
negotiation of IPsec policy
A network administrator is planning to implement centralized management of Cisco VPN devices to simplify VPN deployment for remote offices and teleworkers. Which Cisco IOS feature would provide this solution?
Cisco Easy VPN
Which two statements accurately describe characteristics of IPsec? (Choose two.)
- IPsec works at the network layer and operates over all Layer 2 protocols.
- IPsec is a framework of open standards that relies on existing algorithms.
Refer to the exhibit. Which two IPsec framework components are valid options when configuring an IPsec VPN on a Cisco ISR router? (Choose two.)
- Confidentiality options include DES, 3DES, and AES.
2. Diffie-Hellman options include DH1, DH2, and DH5.
With the Cisco Easy VPN feature, which process ensures that a static route is created on the Cisco Easy VPN Server for the internal IP address of each VPN client?
Reverse Route Injection
Refer to the exhibit. A site-to-site VPN is required from R1 to R3. The administrator is using the SDM Site-to-Site VPN Wizard on R1. Which IP address should the administrator enter in the highlighted field?
10.2.2.2
What is required for a host to use an SSL VPN?
A web browser must be installed on the host.
What are two authentication methods that can be configured using the SDM Site-to-Site VPN Wizard? (Choose two.)
- pre-shared keys.
2. digital certificates.
Which UDP port must be permitted on any IP interface used to exchange IKE information between security gateways?
500
Which requirement necessitates using the Step-by-Step option of the SDM Site-to-Site VPN wizard instead of the Quick Setup option?
AES encryption is required
Which IPsec protocol should be selected when confidentiality is required?
encapsulating security payload
Which statement describes an important characteristic of a site-to-site VPN?
It must be statically set up.