VPN & Concentrators Flashcards

1
Q

List the 4 types of VPNs

A

1) Client-to-site (Remote-Access)
2) Host-to-Host VPN
3) Site-to-Site VPN
4) Extranet VPN (allows organizations suppliers/partners to connect to the network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 5 tunnelling protocols covered in CompTIA

A

1) DTLS - Datagram Transport Layer Security
2) L2TP
3) GRE (generic routing encapsulation)
4) IPsec
5) PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two major protocols work inside IPSec?

What are their protocol numbers?

A

1) AH - Authentication Header (responsible for providing integrity and authentication using Integrity Value Check i.e. IVC). Protocl number 51
2) ESP - Encapsulating Security Payload (responsible for encryption)/ Protocol number 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the protocol number of the Encapsulating Security Payload (ESP) and the Authentication Header? (AH)

A
ESP = 50
AH = 51
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What uses Internet Key Exchange, what port does it use and what does it do?

A

IPsec uses IKE over port 500 to authenticate clients in the IPSec conversation before data is transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens in a split tunnel VPN?

A

The administrator decides which traffic should go through the VPN and which can use the ordinary internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the purpose of NAC regarding employees using devices not directly managed by the business to connect into the corporate network over a VPN?

A

Network Access Controls are required to ensure that insecure devices not directly managed by the organization are appropriately assessed and controlled before being allowed access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List 3 common ‘host health checks’ a NAC system may check for posture assessment on devices connecting over the VPN
What is used to carry out these checks?

A

up to date anti-virus and signatures
up to date OS
firewall enabled on the client

authentication (or health) agents on the clients check the conditions of a computer and report back to the NAC health server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When are persistent NAC agents most commonly used?

A

used for COPE (Corporation-Owned, Personally enabled) devices and approved devices to connect remotely into the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Network Access Control, what can help support the assessment of endpoints (devices) not owned by the organization and help make BYOD policy possible?

A

Nonpersistent agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In NAC, a nonpersistent or dissolvable agent is one that…

A

is used to access the device only during log-in, usually through a web portal. It is removed when authentication has taken place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the key difference between MS-CHAP and MS-CHAPv2?

A

v2 can do mutual authentication of both client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What authentication method is used to overcome the limitations of RADIUS? How?

A

Diameter

It can encrypt the authentication process using EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one of the limitations of RADIUS authentication?

A

It only encrypts the password, but not the entire authentication conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which authentication method developed by Cisco allows for interaction with Kerberos?

A

TACACS+ (Terminal Access Controller, Access-Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which authentication protocol sends credentials in clear text?

A

PAP

17
Q

RADIUS uses UDP, true or false?

A

TRUE