C7 - Quiz

C7 - Quiz

Professional Development

21 Qs

quiz-placeholder

Similar activities

Examen de práctica

Examen de práctica

Professional Development

25 Qs

AWS SAA - 6

AWS SAA - 6

Professional Development

20 Qs

Google Professional Architect 9 - 161 to 180

Google Professional Architect 9 - 161 to 180

Professional Development

20 Qs

BCS Network Security Test 8

BCS Network Security Test 8

University - Professional Development

22 Qs

Missouri Drivers Guide

Missouri Drivers Guide

10th Grade - Professional Development

21 Qs

BCS Network Security Test 6

BCS Network Security Test 6

University - Professional Development

24 Qs

Google Professional Architect 7 - 121 to 140

Google Professional Architect 7 - 121 to 140

Professional Development

20 Qs

Malware/ IOC

Malware/ IOC

10th Grade - Professional Development

20 Qs

C7 - Quiz

C7 - Quiz

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Instructor Instructor

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which protocol creates a virtual point-to-point connection to tunnel unencrypted traffic between Cisco routers from a variety of protocols?

OSPF

IPsec

IKE

GRE

Answer explanation

  • Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is a open source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is a requirement of a site-to-site VPN?


It requires a client/server architecture.


It requires the placement of a VPN server at the edge of the company network.


It requires hosts to use VPN client software to encapsulate traffic.

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

Answer explanation

  • Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which two statements describe a remote access VPN? (Choose two.)


It connects entire networks to each other.


It requires hosts to send TCP/IP traffic through a VPN gateway.


It is used to connect individual hosts securely to a company network over the Internet.


It may require VPN client software on hosts.

It requires static configuration of the VPN tunnel.

Answer explanation

  • Remote access VPNs can be used to support the needs of telecommuters and mobile users by allowing them to connect securely to company networks over the Internet. To connect hosts to the VPN server on the corporate network, the remote access VPN tunnel is dynamically built by client software that runs on the hosts.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

Cisco AnyConnect Secure Mobility Client with SSL


Cisco Secure Mobility Clientless SSL VPN

Frame Relay

remote access VPN using IPsec


site-to-site VPN

Answer explanation

  • The site-to-site VPN is an extension of a classic WAN network that provides a static interconnection of entire networks. Frame Relay would be a better choice than leased lines, but would be more expensive than implementing site-to-site VPNs. The other options refer to remote access VPNs which are better suited for connecting users to the corporate network versus interconnecting two or more networks.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt


Which two scenarios are examples of remote access VPNs? (Choose two.)

A toy manufacturer has a permanent VPN connection to one of its parts suppliers.

All users at a large branch office can access company resources through a single VPN connection.

A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.

An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

Answer explanation

  • Remote access VPNs connect individual users to another network via a VPN client that is installed on the user device. Site-to-site VPNs are "always on" connections that use VPN gateways to connect two sites together. Users at each site can access the network on the other site without having to use any special clients or configurations on their individual devices.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?

The length of a key will not vary between encryption algorithms.


The length of a key does not affect the degree of security.

The shorter the key, the harder it is to break.


The longer the key, the more key possibilities exist.

Answer explanation

  • While preventing brute-force attacks and other forced decryption concerns, the longer the key length, the harder it is to break. A 64-bit key can take one year to break with a sophisticated computer, while a 128-bit key may take 10 19 years to decrypt. Different encryption algorithms will provide varying key lengths for implementation.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement accurately describes a characteristic of IPsec?

IPsec works at the application layer and protects all application data.


IPsec works at the transport layer and protects data at the network layer.


IPsec is a framework of open standards that relies on existing algorithms.


IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.

IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.

Answer explanation

  • IPsec can secure a path between two network devices. IPsec can provide the following security functions:

    • Confidentiality - IPsec ensures confidentiality by using encryption.

    • Integrity - IPsec ensures that data arrives unchanged at the destination using a hash algorithm, such as MD5 or SHA.

    • Authentication - IPsec uses Internet Key Exchange (IKE) to authenticate users and devices that can carry out communication independently. IKE uses several types of authentication, including username and password, one-time password, biometrics, pre-shared keys (PSKs), and digital certificates.

    • Secure key exchange - IPsec uses the Diffie-Hellman (DH) algorithm to provide a public key exchange method for two peers to establish a shared secret key.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?