Network Security - Modules 18-19

Network Security - Modules 18-19

12th Grade

26 Qs

quiz-placeholder

Similar activities

Cybersecurity: Ch 5 & 6

Cybersecurity: Ch 5 & 6

9th - 12th Grade

21 Qs

LO4 Employability and Communication quiz

LO4 Employability and Communication quiz

12th Grade

22 Qs

Internet Searching and Citations

Internet Searching and Citations

9th - 12th Grade

23 Qs

ICT3_QUIZ1

ICT3_QUIZ1

11th - 12th Grade

23 Qs

Sonic the Hedgehog Quizizz

Sonic the Hedgehog Quizizz

KG - Professional Development

23 Qs

CompTIA 220-902 Practice PM TEC

CompTIA 220-902 Practice PM TEC

11th - 12th Grade

26 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

4QICT12 - Current and Future Trends of Media and Information

4QICT12 - Current and Future Trends of Media and Information

11th - 12th Grade

28 Qs

Network Security - Modules 18-19

Network Security - Modules 18-19

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Logan Prewitt

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

1. Which two statements describe the IPsec protocol framework? (Choose two.)

AH uses IP protocol 51.

AH provides integrity and authentication.

  • AH provides encryption and integrity.

  • ESP uses UDP protocol 51.

  • AH provides both authentication and encryption.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. What technology is used to negotiate security associations and calculate shared keys for an IPsec VPN tunnel?

PSK

SHA

3DES

IKE

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. What are the two modes used in IKE Phase 1? (Choose two.)

passive

primary

main

secondary

aggressive

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. What takes place during IKE Phase 2 when establishing an IPsec VPN?

  • Traffic is exchanged between IPsec peers.

IPsec security associations are exchanged.

  • ISAKMP security associations are exchanged.

  • Interesting traffic is identified.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Configure the ISAKMP policies for IKE Phase 2.

Step 1

Step 2

Step 3

Step 4

Step 5

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Apply the IPsec Policy.

Step 1

Step 2

Step 3

Step 4

Step 5

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Verify that the IPsec Tunnel is operational.

Step 1

Step 2

Step 3

Step 4

Step 5

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?