Quiz 11 Flashcards
What client-side issues do you need to consider when planning a VPN deployment? (Choose all that apply.)
Question 1 options:
A) how policies should be enforced on the client computer
B) the organization’s current growth rate
C) the cost of equipment that employees need to buy
D) whether to require the client to use a firewall
A) how policies should be enforced on the client computer
D) whether to require the client to use a firewall
In a mesh topology, all participants in the VPN have with one another.
Question 2 options:
static routes
SAs
tunnels
trusts
SAs
What is a main disadvantage of mesh VPNs?
Question 3 options:
The equipment must be the same at all sites.
There is a lack of confidentiality among peers.
They are not reliable.
They are difficult to enlarge or change.
They are difficult to enlarge or change.
Putting a VPN on the firewall has which of the following disadvantages? (Choose all that apply.)
Question 4 options:
A) Only one server controls security, so any configuration errors leave the network
open to attack.
B) Internet access and VPN traffic compete for resources on the server.
C) VPN traffic is not encrypted.
D) There are more computers to manage
A) Only one server controls security, so any configuration errors leave the network
open to attack.
B) Internet access and VPN traffic compete for resources on the server.
A VPN server configured to receive PPTP traffic listens for incoming connections on
port ______and needs to receive GRE traffic identified by protocol ID______.
Question 5 options:
UDP 1723, 47
UDP 1443, 17
TCP 1723, 47
UDP 3349, 443
TCP 1723, 47
Which protocols and ports must be allowed to pass when you are using L2TP and IPsec? (Choose all that apply.)
Question 6 options:
A) protocol ID 1701
B) TCP 50
C) UDP 500
D) protocol ID 50
A) protocol ID 1701
C) UDP 500
AH uses protocol ID .
Question 7 options:
500
171
51
50
51
The VPN connection through which data passes from one endpoint to another is called
a(n) .
Question 8 options:
gateway
extranet
tunnel
transport
tunnel
A group of authentication and encryption settings that two computers negotiate to set
up a secure VPN connection is called which of the following?
Question 9 options:
key exchange
Security Association (SA)
handshake
protocol
Security Association (SA)
What makes a VPN a cost-effective option?
Question 10 options:
Many VPN applications are available as shareware or freeware.
It requires no administrative configuration to set up or maintain.
VPNs use public Internet and ISP connections.
Computers can use the same hardware and software.
VPNs use public Internet and ISP connections.
IPsec provides for what security activity to take place before data is encrypted or
transmitted?
Question 11 options:
application of security policy settings
establishment of a Security Association (SA)
encapsulation
authentication
establishment of a Security Association (SA)
Which of the following is an advantage of using a star VPN configuration?
Question 12 options:
All participants can communicate with all other participants.
It is easier to increase the VPN’s size.
Only the VPN server at the center or “hub” needs to be updated.
Fewer VPN hardware or software devices are required.
It is easier to increase the VPN’s size.
Because of an increase in the use of Web-based business applications, there has been an
increase in________ -based VPNs.
Question 13 options:
SSL
PPTP
L2TP
IPsec
SSL
Which of the following is not a best practice for VPN client management?
Question 14 options:
Disable Telnet.
Enable split tunneling.
Disable FTP.
Enable VPN quarantine.
Enable split tunneling.
Which of the following IP addresses is most likely to be the source IP address of an
encapsulated VPN packet?
Question 15 options:
11.17.5.210
210.240.255.48
150.80.26.59
172.30.78.45
172.30.78.45