VPNs
GRE Tunnels
IPSec
Remote Access
FLASH
100
This kind of VPN is suitable for supporting the needs of telecommuters and mobile users by allowing them to connect securely to company networks over the Internet.
What is Remote-access?
100
TRUE or FALSE: GRE can encapsulate multiple protocol packet types inside an IP tunnel.
What is TRUE?
100
TRUE or FALSE: IPsec is a proprietary protocol that defines how a VPN can be configured in a secure manner using the Internet Protocol.
What is FALSE?
100
These are the two primary methods for deploying remote-access VPNs:
What are IPSec and SSL?
100
This mechanism provide data integrity by ensuring that the data in the packet was not changed between the source and destination nodes.
What is "Message hashing/Hashing/Hashing Algorithm"?
200
A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. THIS type of technology is required.
What is VPN Gateway?
200
GRE is described as "stateless" because of THIS characteristic.
What is "does not include any flow-control mechanisms"?
200
This is the main difference between Authentication Header(AH) and Encapsulating Security Payload (ESP) IPSec protocols.
What is "Encryption"?
200
The Cisco ASA provides THESE two main deployment modes that are found in Cisco SSL VPN solutions.
What are Cisco AnyConnect Secure Mobility Client with SSL and Cisco Secure Mobility Clientless SSL VPN?
200
This algorithm specifies a public key exchange method that provides a way for two peers to establish a shared secret key that only they know, although they are communicating over an insecure channel.
What is Diffie-Hellman?
300
This is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer device at the other end which decapsulates the traffic.
What is VPN gateway?
300
TRUE or FALSE: The "ip address" command on the tunnel interfaces refers to an IP network where the physical interface belongs to.
What is FALSE?
300
This is one of the four critical functions that is provided by IPsec, which ensures that data has not been changed in transit between the source and destination.
What is Integrity?
300
THIS is the main difference between Cisco AnyConnect Secure Mobility Client with SSL and Cisco Secure Mobility Clientless SSL VPN.
What is "the former requires the Cisco AnyConnect Client software"?
300
IPSec works at this layer of the OSI Model.
What is Layer 3/Network layer?
400
This is one of the many benefits of VPNs which enable organizations to use the Internet infrastructure within ISPs and devices and which makes it easy to add new users.
What is Scalability?
400
Use THIS command to determine whether the tunnel interface is up or down
What is "show ip interface brief" ?
400
IPsec relies on existing algorithms to implement secure communications. It is made up of a framework of open standards. Although it is implemented at Layer 3, it does provide protection for THESE OSI layers
What are layers 4-7?
400
THIS benefit of using Cisco SSL VPN reduces cost and management complexity by facilitating robust remote access and site-to-site VPN services from a SINGLE platform with unified management.
What is "Use of a single device for both SSL VPN and IPsec VPN" ?
400
This protocol is used for site-to-site VPNs and not for remote access VPNs for mobile users because it does not provide any encryption, so the traffic is not secure between the endpoints.
What is GRE tunneling?
500
SSL VPN operates at this layer of the OSI Model.
What is Layer 7?
500
This command is used to verify what encryption mechanism is used in the GRE tunnel.
What is None? (GRE does not support encryption and other security mechanisms)
500
These are the four BASIC building blocks of the IPSec framework.
What are "IPSec protocol/Integrity/Authentication/DH algorithm group"?
500
The Cisco Easy VPN (IPSec) solution consists of THESE three components.
What are "Cisco Easy VPN Server / Cisco Easy VPN Remote / Cisco VPN Client"?
500
This algorithm allows packets in a VPN to be encapsulated with the headers from one or more VPN protocols before being sent across the third party network.
What is tunneling?
M
e
n
u