Module 8: VPN and IPsec Concepts Flashcards

1
Q

True or False? A site-to-site VPN must be statically set up.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two technologies provide enterprise-managed VPN solutions?

A

Site-to-site VPN and Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two technologies provide service provider managed VPN solutions?

A

Layer 2 MPLS VPN and Layer 3 MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithm is used with IPsec to provide data confidentiality?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithms are used with IPsec to provide data integrity?

A

SHA and MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What algorithm is used with IPsec to provide authentication?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What algorithm is used with IPsec to provide key exchange?

A

Diffie-Hellman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

A

Guarantees message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement describes a VPN?

A

VPNs use virtual connections to create a private network through a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is “tunnelling” accomplished in a VPN?

A

New headers from one or more VPN protocols encapsulate the original packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of VPN involves a nonsecure tunnelling protocol being encapsulated by IPsec?

A

GRE over IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two types of VPNs are examples of enterprise-managed remote access VPNs?

A

Client-based IPsec VPNs and clientless SSL VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a static NAT configuration, what NAT address type will Internet hosts use to reach an internal web server?

A

Outside Local address of the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of VPN is used to connect a mobile user?

A

Remote-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which VPN benefit uses advanced encryption and authentication protocols to protect data from unauthorized access?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which VPN benefit allows an enterprise to easily add more users to the network?

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding more equipment or WAN links?

A

Cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which VPN solutions are typically managed by an enterprise?

A

IPsec, SSL, DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does SSL/TLS authenticate peers?

A

Public Key Infrastructure (PKI) and digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False?
SSL/TLS VPNs are more complex to set up than IPsec?

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False?
IPsec is less secure than SSL/TLS VPN

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False?
IPsec is the preferred method of configuring a VPN over SSL/TLS

A

False, both options are valid.

SSL/TLS VPNs are less complex and have more extensive connection options as they work with any device with a web browser.

IPsec is more secure and and supports all IP-based applications, not just

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Site-to-Site VPNs use what terminating devices?

A

VPN Gateways

26
Q

Site-to-Site VPNs are typically created and secured using what technology?

A

IPsec

27
Q

When might Dynamic Multipoint VPN (DMVPN) might be useful?

A

If you have more than a few sites that need securely connecting, such as in a large enterprise.

28
Q

What type of topology does DMVPN use for configuration?

A

Hub-and-Spoke

29
Q

True or False?
Once DMVPN connections are made between sites, all traffic must be routed through the hub site?

A

False.
Once configuration is established, DMVPN allows for a full-mesh between all sites.

30
Q

IPsec VTI maps to what type of interface?

A

A virtual interface, rather than static physical interfaces.

31
Q

True or False?
IPsec VTI can send both unicast and multicast encrypted traffic, therefore supporting routing protocols automatically.

A

True.
It does so without the need to configure GRE tunnels.

32
Q

True or False?
IPsec VTI can only be configured between sites.

A

False.
It can also be configured in a Hub-and-Spoke tpology.

33
Q

What two types of MPLS VPNs are available?

A

Layer 2, where customer routers effectively belong to the same multiaccess network.

Layer 3, where the service provider establishes routing between the customer’s routers and the provider’s router.

34
Q

What type of VPN enables an enterprise to rapidly scale secure access across the organization?

A

DMVPN

35
Q

What type of VPN enables an enterprise to emulate an Ethernet multiaccess LAN with remote sites?

A

MPLS VPN

36
Q

What type of protocol is GRE?

A

Carrier protocol

37
Q

What type of VPN only requires a web browser on the host?

A

SSL/TLS VPNs

38
Q

What type of VPN can be established with a web browser using HTTPS?

A

Clientless VPN

39
Q

In IPsec, what provides authentication for the data origin, integrity, and protection against replay attacks?

A

Authentication Header (AH)

40
Q

In IPsec, what provides encryption for data confidentiality and authentication?

A

Encapsulating Security Payload (ESP)

41
Q

In IPsec, what provides negotiation of security associations and keys?

A
  • ISAKMP (Internet Security Association and Key Management Protocol) sets the ‘blueprint’ for the authentication
  • IKE (Internet Key Exchange) implements the blueprint
  • DH (Diffie-Hellman) performs the secure key exchange
42
Q

IPsec cam protect traffic in which four OSI layers?

A

Layer 4, 5, 6, and 7

43
Q

Which IPsec function uses pre-shared passwords, digital certificates, or RSA certificates?

A

Authentication

44
Q

True or false?
The IPsec framework must be updated each time a new standard is developed?

A

False

45
Q

Which two choies are packet encapsulation options supported by IPsec?

A

AH, ESP

46
Q

Which three choices provide for the Confidentiality function in the IPsec framework?

A

3DES, AES, SEAL

47
Q

Which two choices provide for the Integrity function in the IPsec framework?

A

MD5, SHA

48
Q

Which choices are available for the Authentication function in the IPsec framework?

A

Pre-Shared Key (PSK) and RSA

49
Q

Which Diffie-Hellman group choices are no longer recommended?

A

DH groups 1, 2, and 5.

50
Q

What is the purpose of a remote access VPN and what is typically required for the hosts?

A

To allow secure connections by remote useres to the company network over the internet. It typically requires client software on the hosts.

51
Q

The use of 3DES within the IPsec framework is an example of which of the give IPsec building blocks?

A

Confidentiality

52
Q

Which type of VPN may require VPN Client software?

A

Remote access VPN

53
Q

Which technique is necessary to ensure a private transfer of data using a VPN?

A

Encryption

54
Q

What are the two fundamental Dynamic Multipoint VPN tunnel types?

A

Spoke-to-spoke and hub-to-spoke

55
Q

What are two reasons a company would use a VPN?

A
  • To connect remote users to the network.
  • To allow suppliers access to the network.
56
Q

True or false?
All VPNs securely transmit clear text across the internet.

A

False.

57
Q

Which solution allows workers to telecommute effectively and securely?

A

Remote-access VPN

58
Q

Which VPN type is a service provider managed VPN?

A

Layer 3 MPLS VPN

59
Q

Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

A

Authentication Header (AH)

60
Q

What algorithm is used to provide data integrity of a message through the use of a calculated hash value?

A

Hashed Message Authentication Code (HMAC)

61
Q

What is the advantage of a longer encryption key length?

A

The longer the key, the more key possibilities exist.

62
Q

What is a type of VPN that is generally transparent to the end user?

A

Site-to-site