Module 8: VPN and IPsec Concepts Flashcards
True or False? A site-to-site VPN must be statically set up.
True
Which two technologies provide enterprise-managed VPN solutions?
Site-to-site VPN and Remote access VPN
Which two technologies provide service provider managed VPN solutions?
Layer 2 MPLS VPN and Layer 3 MPLS VPN
What algorithm is used with IPsec to provide data confidentiality?
AES
What algorithms are used with IPsec to provide data integrity?
SHA and MD5
What algorithm is used with IPsec to provide authentication?
RSA
What algorithm is used with IPsec to provide key exchange?
Diffie-Hellman (DH)
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
Generic Routing Encapsulation (GRE)
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?
Guarantees message integrity
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Integrity
Which statement describes a VPN?
VPNs use virtual connections to create a private network through a public network.
How is “tunnelling” accomplished in a VPN?
New headers from one or more VPN protocols encapsulate the original packets.
Which type of VPN involves a nonsecure tunnelling protocol being encapsulated by IPsec?
GRE over IPsec
Which two types of VPNs are examples of enterprise-managed remote access VPNs?
Client-based IPsec VPNs and clientless SSL VPNs
In a static NAT configuration, what NAT address type will Internet hosts use to reach an internal web server?
Outside Local address of the web server
Which type of VPN is used to connect a mobile user?
Remote-access
Which VPN benefit uses advanced encryption and authentication protocols to protect data from unauthorized access?
Security
Which VPN benefit allows an enterprise to easily add more users to the network?
Scalability
Which VPN benefit allows an enterprise to increase the bandwidth for remote sites without necessarily adding more equipment or WAN links?
Cost savings
Which VPN solutions are typically managed by an enterprise?
IPsec, SSL, DMVPN
How does SSL/TLS authenticate peers?
Public Key Infrastructure (PKI) and digital certificates
True or False?
SSL/TLS VPNs are more complex to set up than IPsec?
False.
True or False?
IPsec is less secure than SSL/TLS VPN
False.
True or False?
IPsec is the preferred method of configuring a VPN over SSL/TLS
False, both options are valid.
SSL/TLS VPNs are less complex and have more extensive connection options as they work with any device with a web browser.
IPsec is more secure and and supports all IP-based applications, not just