5.5 Virtual Private Networks

5.5 Virtual Private Networks

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Technical Terms - Internet (A-Z) - Pharming

Technical Terms - Internet (A-Z) - Pharming

12th Grade

10 Qs

Virtual Private Network Quiz

Virtual Private Network Quiz

12th Grade

10 Qs

IT Chapter 9 review

IT Chapter 9 review

10th - 12th Grade

10 Qs

VPN Server

VPN Server

12th Grade

13 Qs

EHR Healthcare

EHR Healthcare

12th Grade

7 Qs

Virtual Private Networks (VPN)

Virtual Private Networks (VPN)

10th - 12th Grade

11 Qs

Virtual Private Network

Virtual Private Network

12th Grade

10 Qs

6.4 Internet Connectivity

6.4 Internet Connectivity

9th - 12th Grade

8 Qs

5.5 Virtual Private Networks

5.5 Virtual Private Networks

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Donna Elliott

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have employees at your company who travel a lot for work. In many locations, unencrypted public Wi-Fi access is provided at airports, restaurants, etc. You're concerned sensitive company data could be exposed. To remedy this situation, you decide to configure employees' notebooks to use a VPN when accessing the home network over an open wireless connection.

Which key steps should you take when implementing this configuration?

Configure the VPN connection to use MS-CHAPv2

Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection and/or configure the VPN connection to use IPsec

Configure the browser to send HTTPS requests through the VPN connection

Configure the VPN connection to use PPTP

None of these apply

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have the task of creating a remote access solution for a global enterprise. The solution should secure encrypted communication for the company's employees worldwide and detect potential security threats in real time.

Which configuration should you deploy to meet these requirements?

A VPN utilizing IKE and IPSec protocols, combined with an inline intrusion detection system (IDS)

A network fortified by 802.1X port security, an Extensible Authentication Protocol (EAP), and a load balancer

A network equipped with a Next Generation Firewall (NGFW), a Web Application Firewall (WAF), and an intrusion prevention system (IPS) in tap/monitor mode

A Software-Defined Wide Area Network (SD-WAN) with secure access service edge (SASE) implementation, supplemented by an intrusion prevention system (IPS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A VPN is primarily used for which of the following purposes?

Support secured communications over an untrusted network

Allow remote systems to save on long-distance charges

Allow the use of network-attached printers

Support the distribution of public web documents

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN implementation uses routers on the edge of each site?

Remote access VPN

Host-to-host VPN

Site-to-site VPN

Always-on VPN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN tunnel style routes only certain types of traffic?

Host-to-host

Site-to-site

Split

Full

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IPSec subprotocol provides data encryption?

AH

AES

SSL

ESP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In addition to Authentication Header (AH), IPsec is comprised of what other service?

Encapsulating Security Payload (ESP)

Advanced Encryption Standard (AES)

Encryption File System (EFS)

Extended Authentication Protocol (EAP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?