Module 8: VPN and IPsec Concepts Flashcards

1
Q

True or False? A site-to-site VPN must be statically set up.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two technologies provide enterprise-managed VPN solutions?

A

Site-to-site VPN and Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two technologies provide service provider managed VPN solutions?

A

Layer 2 MPLS VPN and Layer 3 MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithm is used with IPsec to provide data confidentiality?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithms are used with IPsec to provide data integrity?

A

SHA and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What algorithm is used with IPsec to provide authentication?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What algorithm is used with IPsec to provide key exchange?

A

Diffie-Hellman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

A

Guarantees message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement describes a VPN?

A

VPNs use virtual connections to create a private network through a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is “tunnelling” accomplished in a VPN?

A

New headers from one or more VPN protocols encapsulate the original packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of VPN involves a nonsecure tunnelling protocol being encapsulated by IPsec?

A

GRE over IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two types of VPNs are examples of enterprise-managed remote access VPNs?

A

Client-based IPsec VPNs and clientless SSL VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a static NAT configuration, what NAT address type will Internet hosts use to reach an internal web server?

A

Outside Local address of the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of VPN is used to connect a mobile user?

A

Remote-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which VPN benefit uses advanced encryption and authentication protocols to protect data from unauthorized access?

A

Security

18
Q

Which VPN benefit allows an enterprise to easily add more users to the network?

A

Scalability

19
Q

Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding more equipment or WAN links?

A

Cost savings

20
Q

Which VPN solutions are typically managed by an enterprise?

A

IPsec, SSL, DMVPN

21
Q

How does SSL/TLS authenticate peers?

A

Public Key Infrastructure (PKI) and digital certificates

22
Q

True or False?
SSL/TLS VPNs are more complex to set up than IPsec?

A

False.

23
Q

True or False?
IPsec is less secure than SSL/TLS VPN

A

False.

24
Q

True or False?
IPsec is the preferred method of configuring a VPN over SSL/TLS

A

False, both options are valid.

SSL/TLS VPNs are less complex and have more extensive connection options as they work with any device with a web browser.

IPsec is more secure and and supports all IP-based applications, not just

25
Q

Site-to-Site VPNs use what terminating devices?

A

VPN Gateways

26
Q

Site-to-Site VPNs are typically created and secured using what technology?

A

IPsec

27
Q

When might Dynamic Multipoint VPN (DMVPN) might be useful?

A

If you have more than a few sites that need securely connecting, such as in a large enterprise.

28
Q

What type of topology does DMVPN use for configuration?

A

Hub-and-Spoke

29
Q

True or False?
Once DMVPN connections are made between sites, all traffic must be routed through the hub site?

A

False.
Once configuration is established, DMVPN allows for a full-mesh between all sites.

30
Q

IPsec VTI maps to what type of interface?

A

A virtual interface, rather than static physical interfaces.

31
Q

True or False?
IPsec VTI can send both unicast and multicast encrypted traffic, therefore supporting routing protocols automatically.

A

True.
It does so without the need to configure GRE tunnels.

32
Q

True or False?
IPsec VTI can only be configured between sites.

A

False.
It can also be configured in a Hub-and-Spoke tpology.

33
Q

What two types of MPLS VPNs are available?

A

Layer 2, where customer routers effectively belong to the same multiaccess network.

Layer 3, where the service provider establishes routing between the customer’s routers and the provider’s router.

34
Q

What type of VPN enables an enterprise to rapidly scale secure access across the organization?

A

DMVPN

35
Q

What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?

A

MPLS VPN

36
Q

What type of protocol is GRE?

A

Carrier protocol

37
Q

What type of VPN only requires a web browser on the host?

A

SSL/TLS VPNs

38
Q

What type of VPN can be established with a web browser using HTTPS?

A

Clientless VPN

39
Q

In IPsec, what provides authentication for the data origin, integrity, and protection against replay attacks?

A

Authentication Header (AH)

40
Q

In IPsec, what provides encryption for data confidentiality and authentication?

A

Encapsulating Security Payload (ESP)

41
Q

In IPsec, what provides negotiation of security associations and keys?

A
  • ISAKMP (Internet Security Association and Key Management Protocol) sets the ‘blueprint’ for the authentication
  • IKE (Internet Key Exchange) implements the blueprint
  • DH (Diffie-Hellman) performs the secure key exchange