IS3220 CHAPTER 14 Flashcards

1
Q

This VPN is known as a VPN appliance and is VPN based. This is called ___?

A

CUSTOMER PREMISE EQUIPMENT (CPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This VPN model is used to connect to offices together such as a main office and a remote office and is called ___?

A

GATEWAY-TO-GATEWAY VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is VPN model where the remote client connects to the VPN server to gain access to the internal network and is called ___?

A

HOST-TO-GATEWAY VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is an IPSec based VPN protocol that uses NAT-Traveral (NAT-T) which allows IPSec traffic to pass through a NAT server. It provides significant improvements over previous exchange and has been adopted by several companies such as Microsoft, in Windows Server 2008 R2; Cisco, and OpenSwan. This exchange is called ___?

A

INTERNET KEY EXCHANGE v2 (IKEv2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. ___ provide(s) secure communications external users and internal servers located behind a firewall. (Multiple answers may be correct)
  2. VPNs
  3. IPSec
  4. Intranets
  5. Extranets
  6. SSL
A

VPNs

Extranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A desirable feature of an operating system-based VPN is the ability to refer to remote servers by their network address translated IP addresses.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A VPN is also know as:
  2. A Neural Network
  3. A data-encrypted turned over the Internet
  4. A file sharing and printing server
  5. A bastion host
  6. None of the above
A

A data-encrypted turned over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Encrypted communications using Web browsers usually use the ___ protocol.
A

SECURE SOCKET LAYER (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. An easy and cost-effective way to secure access to a network is by purchasing (an) inexpensive ___.
  2. Switch
  3. Router
  4. Antivirus software
  5. Remote terminal
  6. VPN appliance
A

VPN appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Most VPN appliances are designed for complex installations.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. VPN appliances are ___.
  2. Not readily available
  3. OS specific
  4. Very expensive
  5. Secure technologies
  6. 1 & 2
A

Secure technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What does RDP stand for?
  2. Remote Desktop Processing
  3. Remote Desktop Protocol
  4. Radio Demilitarized Processing
  5. Recovery Dispatching Process
  6. Remote Dial-up Process
A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Another name for Terminal Services is:
  2. Remote Dial-up System
  3. Remote Desktop Services
  4. Remote Desktop System
  5. Remote Dial-up process
A

Remote Desktop Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. GoToMyPC is a remote desktop technology that allows you to remotely access your computer from any other Internet-Connected computer in the world with almost any operating system through a secure, private connection.
    TRUE OR FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What are two primary methods for deploying remote-access VPNs?
  2. SSL and SSH
  3. SSL and API
  4. IPSec and SSL
  5. IPSec and SSH
  6. None of the above
A

IPSec and SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Terminal Services provides the ability to:
  2. Host multiple, simultaneous client sessions
  3. Implement software bugs
  4. Implement dynamic addressing
  5. Sync proxy servers
  6. All the above
A

Host multiple, simultaneous client sessions

17
Q
  1. Terminal Services RemoteApp applications appear to users as if the applications are installed locally when they are actually running a remote server.
    TRUE OR FALSE
A

TRUE

18
Q
  1. Microsoft’s Direct Access:
  2. Is an alternative to a traditional VPN
  3. Is not a VPN
  4. Is a mix of Microsoft Access database served through a VPN
  5. Is a DDNS
  6. Intrusion Detection System
A

Is an alternative to a traditional VPN

19
Q
  1. Users must have physical connectivity with the internal network for the DirectAccess connection to be established.
    TRUE OR FALSE
A

FALSE

20
Q
  1. When performing a download and install of the RPM version of Openswan, you do not need to have the IPSec-tools RPM package installed on your machine.
    TRUE OR FALSE
A

FALSE

21
Q
  1. What are the two methods of installing Openswan?
  2. KLIPS and IPSec
  3. RPM and source libgmp development libraries
  4. By hand or automatically
  5. Remotely and through a diskette
  6. None of the above
A

RPM and source libgmp development libraries

22
Q
  1. To check that you have a successfully installed Openswan VPN you should run the command:
    ipsec verify

TRUE OR FALSE

A

FALSE