ICND2-Chap17 Flashcards

Chapter 17: Virtual Private Networks

1
Q

VPN Encryption Algorithms: Data Encryption Standard (DES)

A

Key Length 56 bits; Older and less secure than the other options listed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPN Encryption Algorithms: Triple DEX (3DES)

A

56 bits x 3; Applies three different 56-bit DES keys in succession; improving the encryption strength versus DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VPN Encryption Algorithms: Advanced Encryption Standard (AES)

A

128 and 256 bits; Considered the current best practice; with strong encryption and less computation than 3DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Diffie-Hellman Option: DH-1 Key Length

A

768-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffie-Hellman Option: DH-2 Key Length

A

1024-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Diffie-Hellman Option: DH-5 Key Length

A

1536-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intranet VPN

A

Connects all the computers at two sites of the same organization; typically using one VPN device at each site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extranet VPN

A

Connects all the computers at two sites of different but partnering organizations; typically using one VPN device at each state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access VPN

A

Connects individual Internet users to the enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPsec Message integrity option: HMAC-MD5

A

HMAC-MD5 uses a 128-bit shared key; generating a 128-bit hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPsec Message integrity option: HMAC-SHA

A

HMAC-Secure Hash Algorithm defines different key sizes (for example; SHA-1 [160]; SHA-256 [256]; and SHA-512 [512]) to support different encryption key sizes. Considered better than MD5 but with more compute-time required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPsec Authentication option: Pre-Shared Keys

A

Both VPN devices must be preconfigured with the same secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ipsec Authentication option: Digital signatures

A

Also called Rivest; Shamir and Adelman (RSA) signatures. The sender encrypts a value with its private key; the receiver decrypts with the sender’s public key and compares with the value listed by the sender in the header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Functions Supported by IPsec Encapsulating Security Payload (ESP)

A

Authentication (weak); Message integrity; Encryption; Antireplay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Functions Supported by IPsec IP Authentication Header (AH)

A

Authentication (strong); Message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly