This chapter looked at how VPNs can be used to extend the corporate networks securely using public networks, such as the Internet. The two basic VPN types are remote access and site-to-site. The three types of VPN connectivity are access VPN, intranet VPN, and extranet VPN. The two VPN modes are transport and tunnel.
While a variety of Layer 2 and Layer 7 VPN implementations exist, IPSec and IETF Layer 3 standards seem to dominate the market today. IPSec technologies include a variety of authentication and encryption methods.
1.? |
Which is not one of the three basic types of VPN connections?
|
|
2.? |
Which is not one of the concerns in using the Internet for conducting private communications?
|
|
3.? |
Which one of the following is a Layer 2 tunneling protocol supported by Microsoft and Cisco?
|
|
4.? |
With which security protocol is the data not encrypted?
|
|
5.? |
What is the size of the encryption key for DES?
|
|
6.? |
Which one of the following is not an encryption algorithm?
|
|
7.? |
Which is the most secure hashing algorithm?
|
|
8.? |
With which security mode is the original IP header encrypted?
|
|
9.? |
Which is not a valid transform?
|
|
10.? |
Transform sets can contain how many AH transforms?
|
|
11.? |
Which cryptography type is also called public key encryption?
|
|
12.? |
Which Diffie-Hellman key exchange offers the most security?
|
|
13.? |
In an IPSec session, what is the minimum number of SAs that will be created?
|
|
14.? |
At what point are the IPSec peers authenticated?
|
|
15.? |
What is a nonce?
|
|
Answers
1.? |
C. Internet VPNs |
2.? |
B. High cost |
3.? |
C. L2TP |
4.? |
A. AH |
5.? |
B. 56 bit |
6.? |
C. ESP |
7.? |
D. HMAC SHA-1 |
8.? |
D. ESP Tunnel |
9.? |
C. ah-des |
10.? |
A. 1 |
11.? |
B. Asymmetric encryption |
12.? |
A. 5 |
13.? |
C. 3—1 IKE and 1 in each direction for IPSec |
14.? |
A. IKE Phase One |
15.? |
C. pseudorandom number |