Search Header Logo

5.5 Virtual Private Networks

Authored by Donna Elliott

Computers

9th - 12th Grade

Used 3+ times

5.5 Virtual Private Networks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have employees at your company who travel a lot for work. In many locations, unencrypted public Wi-Fi access is provided at airports, restaurants, etc. You're concerned sensitive company data could be exposed. To remedy this situation, you decide to configure employees' notebooks to use a VPN when accessing the home network over an open wireless connection.

Which key steps should you take when implementing this configuration?

Configure the VPN connection to use MS-CHAPv2

Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection and/or configure the VPN connection to use IPsec

Configure the browser to send HTTPS requests through the VPN connection

Configure the VPN connection to use PPTP

None of these apply

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have the task of creating a remote access solution for a global enterprise. The solution should secure encrypted communication for the company's employees worldwide and detect potential security threats in real time.

Which configuration should you deploy to meet these requirements?

A VPN utilizing IKE and IPSec protocols, combined with an inline intrusion detection system (IDS)

A network fortified by 802.1X port security, an Extensible Authentication Protocol (EAP), and a load balancer

A network equipped with a Next Generation Firewall (NGFW), a Web Application Firewall (WAF), and an intrusion prevention system (IPS) in tap/monitor mode

A Software-Defined Wide Area Network (SD-WAN) with secure access service edge (SASE) implementation, supplemented by an intrusion prevention system (IPS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A VPN is primarily used for which of the following purposes?

Support secured communications over an untrusted network

Allow remote systems to save on long-distance charges

Allow the use of network-attached printers

Support the distribution of public web documents

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN implementation uses routers on the edge of each site?

Remote access VPN

Host-to-host VPN

Site-to-site VPN

Always-on VPN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN tunnel style routes only certain types of traffic?

Host-to-host

Site-to-site

Split

Full

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IPSec subprotocol provides data encryption?

AH

AES

SSL

ESP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to Authentication Header (AH), IPsec is comprised of what other service?

Encapsulating Security Payload (ESP)

Advanced Encryption Standard (AES)

Encryption File System (EFS)

Extended Authentication Protocol (EAP)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?