Chapter 19. Virtual Private Network (VPN) Flashcards

1
Q
  1. Which site-to-site VPN network topology is supported by Cisco Secure Firewall?

A. Point-to-Point

B. Hub and Spoke

C. Full Mesh

D. All of these answers are correct.

A

D. All of these answers are correct. Secure Firewall supports all three network topologies—Point-to-Point, Hub and Spoke, and Full Mesh—in a VPN configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol is not part of the IPsec framework?

A. Authentication Header (AH)

B. Generic Routing Encapsulation (GRE)

C. Internet Key Exchange (IKE)

D. Encapsulating Security Payload (ESP)

A

B. Generic Routing Encapsulation (GRE). AH, ESP, and IKE are the three major protocols in an IPsec framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following protocols is used for encryption?

A. AES

B. ECDH

C. DH

D. SHA

A

A. AES. The Advanced Encryption Standard (AES) is a data encryption protocol that is standardized in FIPS 197.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following protocols is used for data integrity?

A. AES

B. ECDH

C. SHA

D. DH

A

C. SHA. The Secure Hash Algorithm (SHA) is used for data integrity and is standardized in FIPS 180-4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following protocols is used to exchange secret keys?

A. IKE

B. ISAKMP

C. ECDH

D. All of these answers are correct.

A

D. All of these answers are correct. IKE, ISAKMP, and ECDH—all these protocols are used for key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. For site-to-site VPN deployment on Secure Firewall, which of the following is true?

A. When you are registering a management center with Cisco Smart Software Licensing, the export-controlled functionality must be allowed for stronger encryption algorithms.

B. Secure Firewall supports the configuration of a site-to-site virtual private network using both IKEv1 and IKEv2 protocols.

C. If an interface of the threat defense is configured with NAT and VPN, you need to exempt the internal traffic from being translated.

D. All of these answers are correct.

A

D. All of these answers are correct. When you are registering a management center with Cisco Smart Software Licensing, the export-controlled functionality must be allowed to enable modern encryption algorithms. Secure Firewall supports the configuration of a site-to-site virtual private network using both IKEv1 and IKEv2 protocols. If an interface of the threat defense is configured with NAT and VPN, you need to exempt the internal traffic from being translated using an identity NAT rule. This process is called NAT exemption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. For a remote access VPN deployment of Secure Firewall, which of the following is false?

A. Secure Firewall supports the SSL protocol only to establish a secure connection with remote users.

B. The Simple Certificate Enrollment Protocol (SCEP) allows a threat defense to act as a CA server for a remote user.

C. When connecting to a remote access VPN, the remote user connects to the organization’s authentication server directly for credential validation.

D. All of these answers are correct.

A

D. All of these answers are correct. Secure Firewall supports both SSL and IKEv2 protocols in remote access VPN configuration. SCEP protocol allows Secure Firewall to obtain a certificate directly from the certificate authority. When remote users connect to a threat defense for VPN access, the threat defense communicates to an authentication server for credential validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly