IPSEC 3 Flashcards

Multi choice questions

1
Q

What command is used to apply an IPsec profile to an interface on a Cisco router?

a. crypto map
b. interface ipsec
c. ipsec apply
d. ipsec profile

A

Answer: d. ipsec profile.

Explanation: The ipsec profile command is used to apply an IPsec profile to an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol and port are commonly used for IKE negotiations in Cisco IPsec implementations?

a. UDP port 500
b. TCP port 80
c. UDP port 4500
d. TCP port 22

A

Answer: a. UDP port 500.

Explanation: UDP port 500 is commonly used for IKE negotiations in Cisco IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the crypto map command in a Cisco IPsec configuration?

a. To configure the IPsec transform set
b. To define a pre-shared key for IKE authentication
c. To set up the IPsec tunnel mode
d. To associate an IPsec profile with an interface

A

Answer: c. To set up the IPsec tunnel mode.

Explanation: The crypto map command is used to configure the IPsec tunnel mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which command is used to remove an IPsec profile from an interface on a Cisco router?

a. no ipsec profile
b. remove ipsec profile
c. clear ipsec profile
d. undo ipsec profile

A

Answer: a. no ipsec profile.

Explanation: The no ipsec profile command is used to remove an IPsec profile from an interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a Cisco IPsec configuration, what is the purpose of the crypto isakmp policy command?

a. To define a pre-shared key for IKE authentication
b. To configure the IPsec transform set
c. To set up the IPsec tunnel mode
d. To specify the parameters for IKE Phase 1

A

Answer: d. To specify the parameters for IKE Phase 1.

Explanation: The crypto isakmp policy command is used to specify the parameters for IKE Phase 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly