Module 8 - VPN and IPsec Concepts Review

Module 8 - VPN and IPsec Concepts Review

Assessment

Flashcard

Computers

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

15 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?

Back

guarantees message integrity

Answer explanation

The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The Hashed Message Authentication Code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.

2.

FLASHCARD QUESTION

Front

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

Back

GRE

Answer explanation

Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

3.

FLASHCARD QUESTION

Front

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

Back

clientless SSL

Answer explanation

When a web browser is used to securely access the corporate network, the browser must use a secure version of HTTP to provide SSL encryption. A VPN client is not required to be installed on the remote host, so a clientless SSL connection is used.

4.

FLASHCARD QUESTION

Front

Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?

Back

integrity

Answer explanation

Integrity is a function of IPsec and ensures data arrives unchanged at the destination through the use of a hash algorithm. Confidentiality is a function of IPsec and utilizes encryption to protect data transfers with a key. Authentication is a function of IPsec and provides specific access to users and devices with valid authentication factors. Secure key exchange is a function of IPsec and allows two peers to maintain their private key confidentiality while sharing their public key.

5.

FLASHCARD QUESTION

Front

Which is a requirement of a site-to-site VPN?

Back

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Answer explanation

Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.

6.

FLASHCARD QUESTION

Front

What is the function of the Diffie-Hellman algorithm within the IPsec framework?

Back

allows peers to exchange shared keys

Answer explanation

The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.

7.

FLASHCARD QUESTION

Front

How is "tunneling" accomplished in a VPN?

Back

New headers from one or more VPN protocols encapsulate the original packets.

Answer explanation

Packets in a VPN are encapsulated with the headers from one or more VPN protocols before being sent across the third party network. This is referred to as "tunneling". These outer headers can be used to route the packets, authenticate the source, and prevent unauthorized users from reading the contents of the packets.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?