Virtual Private Networks Flashcards

1
Q

VPN

A

Virtual Private Network

Secure connection between remote end and private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPN Concentrator

A

Advanced router that handles multiple connections (tunnels) into a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP Tunnel

A

Secure VPN connection between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Remote Access VPN

A

Facilitates network access for users in remote office networks.
Client initiates the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site-to-Site VPN

A

Virtual link from one site to another. Replaces a WAN type of connection.
Requires network hardware (router / firewall) to create and maintain connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hub-and-Spoke Network

A

Traditional site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DMVPN

A

Dynamic Multipoint Virtual Private Network
Spoke-to-spoke network
Data exchanged between sites without passing through organization’s VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client-to-Site VPN

A

Mobile users remotely access information from home network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GRE

A

Generic Routing Encapsulation
Early tunneling protocol (1994)
Used in site-to-site VPNs. Encapsulates 20 types of protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PPP

A

Point-to-Point Protocol

Dial-up connection with ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PAP

A

Password Authentication Protocol
Multifactor authentication protocol
Unencrypted (clear-text) authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CHAP

A

Challenge Handshake Authentication Protocol

Encrypted authentication, uses MD5 file hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHA

A

Secure Hash Algorithm
Secure Hash Algorithm
Required for certain government applications
SHA-0, -1, -2, -3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EAP

A

Extensible Authentication Protocol

A PPP authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PPTP

A

Point-to-Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

L2TP

A

Layer 2 Tunneling Protocol

Merges PPTP and L2F

17
Q

IPSEC

A

Internet Protocol Security
Encrypted end-to-end connection
Uses AH and ESP

18
Q

AH

A

Authentication Header

Guarantees authenticity of IP packets. uses one-way hash algorithm.

19
Q

ESP

A

Encapsulating Security Payload

Provides confidentiality to data with encryption such as DES, 3DES, AES

20
Q

AES

A

Advanced Encryption Standard

21
Q

IKE

A

Internet Key Exchange

Manages negotiation between devices establishing IPsec tunnels

22
Q

ISAKMP

A

Internet Security Association and Key Management Protocol