Quiz 11 Flashcards

1
Q

What client-side issues do you need to consider when planning a VPN deployment? (Choose all that apply.)
Question 1 options:

A) how policies should be enforced on the client computer

B) the organization’s current growth rate

C) the cost of equipment that employees need to buy

D) whether to require the client to use a firewall

A

A) how policies should be enforced on the client computer

D) whether to require the client to use a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a mesh topology, all participants in the VPN have with one another.

Question 2 options:

static routes

SAs

tunnels

trusts

A

SAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a main disadvantage of mesh VPNs?

Question 3 options:

The equipment must be the same at all sites.

There is a lack of confidentiality among peers.

They are not reliable.

They are difficult to enlarge or change.

A

They are difficult to enlarge or change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Putting a VPN on the firewall has which of the following disadvantages? (Choose all that apply.)
Question 4 options:

A) Only one server controls security, so any configuration errors leave the network
open to attack.

B) Internet access and VPN traffic compete for resources on the server.

C) VPN traffic is not encrypted.

D) There are more computers to manage

A

A) Only one server controls security, so any configuration errors leave the network
open to attack.

B) Internet access and VPN traffic compete for resources on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A VPN server configured to receive PPTP traffic listens for incoming connections on
port ______and needs to receive GRE traffic identified by protocol ID______.
Question 5 options:

UDP 1723, 47

UDP 1443, 17

TCP 1723, 47

UDP 3349, 443

A

TCP 1723, 47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocols and ports must be allowed to pass when you are using L2TP and IPsec? (Choose all that apply.)
Question 6 options:

A) protocol ID 1701

B) TCP 50

C) UDP 500

D) protocol ID 50

A

A) protocol ID 1701

C) UDP 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH uses protocol ID .

Question 7 options:

500

171

51

50

A

51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The VPN connection through which data passes from one endpoint to another is called
a(n) .
Question 8 options:

gateway

extranet

tunnel

transport

A

tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group of authentication and encryption settings that two computers negotiate to set
up a secure VPN connection is called which of the following?
Question 9 options:

key exchange

Security Association (SA)

handshake

protocol

A

Security Association (SA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes a VPN a cost-effective option?

Question 10 options:

Many VPN applications are available as shareware or freeware.

It requires no administrative configuration to set up or maintain.

VPNs use public Internet and ISP connections.

Computers can use the same hardware and software.

A

VPNs use public Internet and ISP connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPsec provides for what security activity to take place before data is encrypted or
transmitted?
Question 11 options:

application of security policy settings

establishment of a Security Association (SA)

encapsulation

authentication

A

establishment of a Security Association (SA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an advantage of using a star VPN configuration?

Question 12 options:

All participants can communicate with all other participants.

It is easier to increase the VPN’s size.

Only the VPN server at the center or “hub” needs to be updated.

Fewer VPN hardware or software devices are required.

A

It is easier to increase the VPN’s size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Because of an increase in the use of Web-based business applications, there has been an
increase in________ -based VPNs.
Question 13 options:

SSL

PPTP

L2TP

IPsec

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not a best practice for VPN client management?

Question 14 options:

Disable Telnet.

Enable split tunneling.

Disable FTP.

Enable VPN quarantine.

A

Enable split tunneling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following IP addresses is most likely to be the source IP address of an
encapsulated VPN packet?
Question 15 options:

11.17.5.210

210.240.255.48

150.80.26.59

172.30.78.45

A

172.30.78.45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly