Module 8: VPN and IPsec Concepts Flashcards

1
Q

True or False? A site-to-site VPN must be statically set up.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two technologies provide enterprise-managed VPN solutions?

A

Site-to-site VPN and Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two technologies provide service provider managed VPN solutions?

A

Layer 2 MPLS VPN and Layer 3 MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithm is used with IPsec to provide data confidentiality?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithms are used with IPsec to provide data integrity?

A

SHA and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What algorithm is used with IPsec to provide authentication?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What algorithm is used with IPsec to provide key exchange?

A

Diffie-Hellman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

A

Guarantees message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement describes a VPN?

A

VPNs use virtual connections to create a private network through a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is “tunnelling” accomplished in a VPN?

A

New headers from one or more VPN protocols encapsulate the original packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of VPN involves a nonsecure tunnelling protocol being encapsulated by IPsec?

A

GRE over IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two types of VPNs are examples of enterprise-managed remote access VPNs?

A

Client-based IPsec VPNs and clientless SSL VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a static NAT configuration, what NAT address type will Internet hosts use to reach an internal web server?

A

Outside Local address of the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of VPN is used to connect a mobile user?

A

Remote-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which VPN benefit uses advanced encryption and authentication protocols to protect data from unauthorized access?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which VPN benefit allows an enterprise to easily add more users to the network?

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding more equipment or WAN links?

A

Cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which VPN solutions are typically managed by an enterprise?

A

IPsec, SSL, DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does SSL/TLS authenticate peers?

A

Public Key Infrastructure (PKI) and digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False?
SSL/TLS VPNs are more complex to set up than IPsec?

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False?
IPsec is less secure than SSL/TLS VPN

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False?
IPsec is the preferred method of configuring a VPN over SSL/TLS

A

False, both options are valid.

SSL/TLS VPNs are less complex and have more extensive connection options as they work with any device with a web browser.

IPsec is more secure and and supports all IP-based applications, not just

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Site-to-Site VPNs use what terminating devices?
VPN Gateways
26
Site-to-Site VPNs are typically created and secured using what technology?
IPsec
27
When might Dynamic Multipoint VPN (DMVPN) might be useful?
If you have more than a few sites that need securely connecting, such as in a large enterprise.
28
What type of topology does DMVPN use for configuration?
Hub-and-Spoke
29
True or False? Once DMVPN connections are made between sites, all traffic must be routed through the hub site?
False. Once configuration is established, DMVPN allows for a full-mesh between all sites.
30
IPsec VTI maps to what type of interface?
A virtual interface, rather than static physical interfaces.
31
True or False? IPsec VTI can send both unicast and multicast encrypted traffic, therefore supporting routing protocols automatically.
True. It does so without the need to configure GRE tunnels.
32
True or False? IPsec VTI can only be configured between sites.
False. It can also be configured in a Hub-and-Spoke tpology.
33
What two types of MPLS VPNs are available?
Layer 2, where customer routers effectively belong to the same multiaccess network. Layer 3, where the service provider establishes routing between the customer's routers and the provider's router.
34
What type of VPN enables an enterprise to rapidly scale secure access across the organization?
DMVPN
35
What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?
MPLS VPN
36
What type of protocol is GRE?
Carrier protocol
37
What type of VPN only requires a web browser on the host?
SSL/TLS VPNs
38
What type of VPN can be established with a web browser using HTTPS?
Clientless VPN
39
In IPsec, what provides authentication for the data origin, integrity, and protection against replay attacks?
Authentication Header (AH)
40
In IPsec, what provides encryption for data confidentiality and authentication?
Encapsulating Security Payload (ESP)
41
In IPsec, what provides negotiation of security associations and keys?
- ISAKMP (Internet Security Association and Key Management Protocol) sets the 'blueprint' for the authentication - IKE (Internet Key Exchange) implements the blueprint - DH (Diffie-Hellman) performs the secure key exchange
42
IPsec cam protect traffic in which four OSI layers?
Layer 4, 5, 6, and 7
43
Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates?
Authentication
44
True or false? The IPsec framework must be updated each time a new standard is developed?
False
45
Which two choies are packet encapsulation options supported by IPsec?
AH, ESP
46
Which three choices provide for the Confidentiality function in the IPsec framework?
3DES, AES, SEAL
47
Which two choices provide for the Integrity function in the IPsec framework?
MD5, SHA
48
Which choices are available for the Authentication function in the IPsec framework?
Pre-Shared Key (PSK) and RSA
49
Which Diffie-Hellman group choices are no longer recommended?
DH groups 1, 2, and 5.
50
What is the purpose of a remote access VPN and what is typically required for the hosts?
To allow secure connections by remote useres to the company network over the internet. It typically requires client software on the hosts.
51
The use of 3DES within the IPsec framework is an example of which of the give IPsec building blocks?
Confidentiality
52
Which type of VPN may require VPN Client software?
Remote access VPN
53
Which technique is necessary to ensure a private transfer of data using a VPN?
Encryption
54
What are the two fundamental Dynamic Multipoint VPN tunnel types?
Spoke-to-spoke and hub-to-spoke
55
What are two reasons a company would use a VPN?
- To connect remote users to the network. - To allow suppliers access to the network.
56
True or false? All VPNs securely transmit clear text across the internet.
False.
57
Which solution allows workers to telecommute effectively and securely?
Remote-access VPN
58
Which VPN type is a service provider managed VPN?
Layer 3 MPLS VPN
59
Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?
Authentication Header (AH)
60
What algorithm is used to provide data integrity of a message through the use of a calculated hash value?
Hashed Message Authentication Code (HMAC)
61
What is the advantage of a longer encryption key length?
The longer the key, the more key possibilities exist.
62
What is a type of VPN that is generally transparent to the end user?
Site-to-site