Module 8 - VPN and IPsec Concepts Review
Flashcard
•
Computers
•
12th Grade
•
Practice Problem
•
Hard
Wayground Content
Used 1+ times
FREE Resource
Student preview

15 questions
Show all answers
1.
FLASHCARD QUESTION
Front
What is the function of the Hashed Message Authentication Code (HMAC) algorithm in setting up an IPsec VPN?
Back
guarantees message integrity
Answer explanation
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The Hashed Message Authentication Code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.
2.
FLASHCARD QUESTION
Front
Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?
Back
GRE
Answer explanation
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.
3.
FLASHCARD QUESTION
Front
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
Back
clientless SSL
Answer explanation
When a web browser is used to securely access the corporate network, the browser must use a secure version of HTTP to provide SSL encryption. A VPN client is not required to be installed on the remote host, so a clientless SSL connection is used.
4.
FLASHCARD QUESTION
Front
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Back
integrity
Answer explanation
Integrity is a function of IPsec and ensures data arrives unchanged at the destination through the use of a hash algorithm. Confidentiality is a function of IPsec and utilizes encryption to protect data transfers with a key. Authentication is a function of IPsec and provides specific access to users and devices with valid authentication factors. Secure key exchange is a function of IPsec and allows two peers to maintain their private key confidentiality while sharing their public key.
5.
FLASHCARD QUESTION
Front
Which is a requirement of a site-to-site VPN?
Back
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
Answer explanation
Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.
6.
FLASHCARD QUESTION
Front
What is the function of the Diffie-Hellman algorithm within the IPsec framework?
Back
allows peers to exchange shared keys
Answer explanation
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.
7.
FLASHCARD QUESTION
Front
How is "tunneling" accomplished in a VPN?
Back
New headers from one or more VPN protocols encapsulate the original packets.
Answer explanation
Packets in a VPN are encapsulated with the headers from one or more VPN protocols before being sent across the third party network. This is referred to as "tunneling". These outer headers can be used to route the packets, authenticate the source, and prevent unauthorized users from reading the contents of the packets.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Community Manager and Virtual Communities
Flashcard
•
12th Grade
15 questions
Convex and Concave Lenses
Flashcard
•
10th - 12th Grade
13 questions
Health Sciences Diplomas
Flashcard
•
12th Grade
10 questions
TAC Charter Day - Name That Chapter President
Flashcard
•
12th Grade
15 questions
Cloud Services Impact
Flashcard
•
12th Grade
15 questions
Mirror Flashcard
Flashcard
•
University
14 questions
ENSA Module 7 -- MPLS
Flashcard
•
12th Grade
14 questions
Flashcard on Internet of Things
Flashcard
•
12th Grade
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
10 questions
Martin Luther King, Jr. For Kids
Interactive video
•
1st - 12th Grade
10 questions
Dr. King's Speech and Its Impact
Interactive video
•
7th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
7 questions
Anti-Bullying ARS 15-341
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
15 questions
TSI Math Practice Questions
Quiz
•
8th - 12th Grade
24 questions
Identify Properties of Polygons and Quadrilaterals
Quiz
•
9th - 12th Grade