
5.5 Virtual Private Networks
Authored by Donna Elliott
Computers
9th - 12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have employees at your company who travel a lot for work. In many locations, unencrypted public Wi-Fi access is provided at airports, restaurants, etc. You're concerned sensitive company data could be exposed. To remedy this situation, you decide to configure employees' notebooks to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration?
Configure the VPN connection to use MS-CHAPv2
Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection and/or configure the VPN connection to use IPsec
Configure the browser to send HTTPS requests through the VPN connection
Configure the VPN connection to use PPTP
None of these apply
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have the task of creating a remote access solution for a global enterprise. The solution should secure encrypted communication for the company's employees worldwide and detect potential security threats in real time.
Which configuration should you deploy to meet these requirements?
A VPN utilizing IKE and IPSec protocols, combined with an inline intrusion detection system (IDS)
A network fortified by 802.1X port security, an Extensible Authentication Protocol (EAP), and a load balancer
A network equipped with a Next Generation Firewall (NGFW), a Web Application Firewall (WAF), and an intrusion prevention system (IPS) in tap/monitor mode
A Software-Defined Wide Area Network (SD-WAN) with secure access service edge (SASE) implementation, supplemented by an intrusion prevention system (IPS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A VPN is primarily used for which of the following purposes?
Support secured communications over an untrusted network
Allow remote systems to save on long-distance charges
Allow the use of network-attached printers
Support the distribution of public web documents
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which VPN implementation uses routers on the edge of each site?
Remote access VPN
Host-to-host VPN
Site-to-site VPN
Always-on VPN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which VPN tunnel style routes only certain types of traffic?
Host-to-host
Site-to-site
Split
Full
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which IPSec subprotocol provides data encryption?
AH
AES
SSL
ESP
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In addition to Authentication Header (AH), IPsec is comprised of what other service?
Encapsulating Security Payload (ESP)
Advanced Encryption Standard (AES)
Encryption File System (EFS)
Extended Authentication Protocol (EAP)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?