Module 8: VPN and IPsec Concepts Flashcards
True or False? A site-to-site VPN must be statically set up.
True
Which two technologies provide enterprise-managed VPN solutions?
Site-to-site VPN and Remote access VPN
Which two technologies provide service provider managed VPN solutions?
Layer 2 MPLS VPN and Layer 3 MPLS VPN
What algorithm is used with IPsec to provide data confidentiality?
AES
What algorithms are used with IPsec to provide data integrity?
SHA and MD5
What algorithm is used with IPsec to provide authentication?
RSA
What algorithm is used with IPsec to provide key exchange?
Diffie-Hellman (DH)
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
Generic Routing Encapsulation (GRE)
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?
Guarantees message integrity
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Integrity
Which statement describes a VPN?
VPNs use virtual connections to create a private network through a public network.
How is “tunnelling” accomplished in a VPN?
New headers from one or more VPN protocols encapsulate the original packets.
Which type of VPN involves a nonsecure tunnelling protocol being encapsulated by IPsec?
GRE over IPsec
Which two types of VPNs are examples of enterprise-managed remote access VPNs?
Client-based IPsec VPNs and clientless SSL VPNs
In a static NAT configuration, what NAT address type will Internet hosts use to reach an internal web server?
Outside Local address of the web server
Which type of VPN is used to connect a mobile user?
Remote-access