ENSA - Module 8 - VPN and IP Sec Concepts

ENSA - Module 8 - VPN and IP Sec Concepts

Professional Development

15 Qs

quiz-placeholder

Similar activities

Google Professional Architect 10 - 181 to 197

Google Professional Architect 10 - 181 to 197

Professional Development

17 Qs

Safety on-line

Safety on-line

Professional Development

10 Qs

Firewalls

Firewalls

Professional Development

10 Qs

Salesforce Refresher Session Pre-test

Salesforce Refresher Session Pre-test

Professional Development

10 Qs

Grounding and Bonding quiz #1

Grounding and Bonding quiz #1

Professional Development

15 Qs

Identity Theft , Scams & Phishing

Identity Theft , Scams & Phishing

Professional Development

18 Qs

Google Professional Architect 2 - 21 to 40

Google Professional Architect 2 - 21 to 40

Professional Development

20 Qs

FortiManager Cloud

FortiManager Cloud

Professional Development

10 Qs

ENSA - Module 8 - VPN and IP Sec Concepts

ENSA - Module 8 - VPN and IP Sec Concepts

Assessment

Quiz

Instructional Technology

Professional Development

Hard

Created by

Andrew Cruickshank

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Ipsec protocols are used to provide data integrity? (choose two)

DH
AES
SHA
RSA
MD5

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of traffic allows multicast and broadcast traffic over a secure site-to-site VPN?

GRE over IPsec
SSL VPN
Dynamic multipoint VPN
IPsec virtual tunnel interface
IPsec

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of VPN connects using the Transport Layer Security (TLS) feature?

IPsec
Dynamic mulipoint VPN
SSL VPN
GRE over IPsec
DH

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)

DSL switch
Multilayer switch
MPLS switch
Router
Another ASA

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

Site-to-site
Hub-and-Spoke
Client-to-Site
Spoke-to-Spoke
Server-to-Client

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type pf VPN uses a hub-and-spoke configuration to establish a full mesh topology?

MPLS VPN
Dynamic multipoint VPN
GRE over IPsec
IPsec over GRE
IPsec

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

ESP
DH
SHA
AH
HMAC

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?