5.5 Virtual Private Networks

5.5 Virtual Private Networks

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz-SOHO Networking

Quiz-SOHO Networking

12th Grade

10 Qs

quizizz asj

quizizz asj

1st - 12th Grade

15 Qs

VPN SERVER

VPN SERVER

12th Grade

10 Qs

Quizizz vpn

Quizizz vpn

12th Grade

15 Qs

Administração de Redes - NAT, VPN, IPSec e Sniffer

Administração de Redes - NAT, VPN, IPSec e Sniffer

10th Grade

9 Qs

Connection types and networks

Connection types and networks

3rd - 12th Grade

10 Qs

Exploring Networking Concepts

Exploring Networking Concepts

11th Grade

10 Qs

Technical Terms - Internet (A-Z) - PPTP

Technical Terms - Internet (A-Z) - PPTP

12th Grade

10 Qs

5.5 Virtual Private Networks

5.5 Virtual Private Networks

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Donna Elliott

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have employees at your company who travel a lot for work. In many locations, unencrypted public Wi-Fi access is provided at airports, restaurants, etc. You're concerned sensitive company data could be exposed. To remedy this situation, you decide to configure employees' notebooks to use a VPN when accessing the home network over an open wireless connection.

Which key steps should you take when implementing this configuration?

Configure the VPN connection to use MS-CHAPv2

Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection and/or configure the VPN connection to use IPsec

Configure the browser to send HTTPS requests through the VPN connection

Configure the VPN connection to use PPTP

None of these apply

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have the task of creating a remote access solution for a global enterprise. The solution should secure encrypted communication for the company's employees worldwide and detect potential security threats in real time.

Which configuration should you deploy to meet these requirements?

A VPN utilizing IKE and IPSec protocols, combined with an inline intrusion detection system (IDS)

A network fortified by 802.1X port security, an Extensible Authentication Protocol (EAP), and a load balancer

A network equipped with a Next Generation Firewall (NGFW), a Web Application Firewall (WAF), and an intrusion prevention system (IPS) in tap/monitor mode

A Software-Defined Wide Area Network (SD-WAN) with secure access service edge (SASE) implementation, supplemented by an intrusion prevention system (IPS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A VPN is primarily used for which of the following purposes?

Support secured communications over an untrusted network

Allow remote systems to save on long-distance charges

Allow the use of network-attached printers

Support the distribution of public web documents

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN implementation uses routers on the edge of each site?

Remote access VPN

Host-to-host VPN

Site-to-site VPN

Always-on VPN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN tunnel style routes only certain types of traffic?

Host-to-host

Site-to-site

Split

Full

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IPSec subprotocol provides data encryption?

AH

AES

SSL

ESP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to Authentication Header (AH), IPsec is comprised of what other service?

Encapsulating Security Payload (ESP)

Advanced Encryption Standard (AES)

Encryption File System (EFS)

Extended Authentication Protocol (EAP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?