8.4.2 Module Quiz – VPN and IPsec Concepts (Answers)

8.4.2 Module Quiz – VPN and IPsec Concepts Answers

1. Which two statements describe a remote access VPN? (Choose two.)

  • It connects entire networks to each other.
  • It requires hosts to send TCP/IP traffic through a VPN gateway.
  • It is used to connect individual hosts securely to a company network over the Internet.
  • It may require VPN client software on hosts.
  • It requires static configuration of the VPN tunnel.

Explanation: Remote access VPNs can be used to support the needs of telecommuters and mobile users by allowing them to connect securely to company networks over the Internet. To connect hosts to the VPN server on the corporate network, the remote access VPN tunnel is dynamically built by client software that runs on the hosts.

2. The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?

  • Diffie-Hellman
  • integrity
  • authentication
  • nonrepudiation
  • confidentiality

Explanation: The IPsec framework consists of five building blocks. Each building block performs a specific securty function via specific protocols. The function of providing confidentiality is provided by protocols such as DES, 3DES, and AES.

3. Which type of VPN may require the Cisco VPN Client software?

  • MPLS VPN
  • site-to-site VPN
  • remote access VPN
  • SSL VPN

Explanation: With a remote-access VPN, the client peer may need special VPN client software installed.

4. Which technique is necessary to ensure a private transfer of data using a VPN?

  • scalability
  • authorization
  • virtualization
  • encryption

Explanation: Confidential and secure transfers of data with VPNs require data encryption.

5. What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

  • client-to-site
  • server-to-client
  • site-to-site
  • hub-to-spoke
  • spoke-to-spoke

Explanation: The two fundamental DMVPN designs include:

  • Spoke-to-spoke
  • Hub-to-spoke

6. What are two reasons a company would use a VPN? (Choose two.)

  • to test network connections to remote users
  • to increase bandwidth to the network
  • to eliminate the need of having a gateway
  • to connect remote users to the network
  • to allow suppliers to access the network

Explanation: Organizations use VPNs to have a reliable secure method to connect remote users, branch offices, and suppliers to the company network. To implement VPNs, a VPN gateway is necessary.

7. True or False? All VPNs securely transmit clear text across the Internet.

  • true
  • false

Explanation: A VPN is secure (private) when encrypted traffic is sent over a public network, such as the Internet.

8. Which solution allows workers to telecommute effectively and securely?

  • dial-up connection
  • site-to-site VPN
  • DSL connection
  • remote-access VPN

Explanation: Telecommuters using remote-access VPNs can securely connect to their corporate networks from anywhere by creating an encrypted tunnel, allowing them to effectively complete their work. They may connect using a variety of access technologies, including dial-up and DSL connections. These connections, however, are not secure without the use of VPN technology.​

9. Which VPN type is a service provider managed VPN?

  • GRE over IPsec VPN
  • site-to-site VPN
  • remote access VPN
  • Layer 3 MPLS VPN

Explanation: VPNs can be managed and deployed as:

  • Enterprise VPNs – Enterprise managed VPNs are a common solution for securing enterprise traffic across the internet. Site-to-site and remote access VPNs are examples of enterprise managed VPNs.
  • Service Provider VPNs – Service provider managed VPNs are created and managed over the provider network. Layer 2 and Layer 3 MPLS are examples of service provider managed VPNs. Other legacy WAN solutions include Frame Relay and ATM VPNs.

10. Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

  • DH
  • ESP
  • AH
  • IP protocol 50

Explanation: Authentication Header (AH) is IP protocol 51 and does not provide data confidentiality. The data payload is not encrypted. Encapsulating Security Payload (ESP) is IP protocol 50 and provides data confidentiality, integrity, and authentication. The DH algorithm is used in IPsec to negotiate a shared secret key for the peers.

11. What algorithm is used to provide data integrity of a message through the use of a calculated hash value?

  • AES
  • RSA
  • DH
  • HMAC

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. To ensure that data is not intercepted and modified (data integrity), Hashed Message Authentication Code (HMAC) is used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm that is used for authentication.

12. Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?

  • The shorter the key, the harder it is to break.
  • The length of a key will not vary between encryption algorithms.
  • The length of a key does not affect the degree of security.
  • The longer the key, the more key possibilities exist.

Explanation: While preventing brute-force attacks and other forced decryption concerns, the longer the key length, the harder it is to break. A 64-bit key can take one year to break with a sophisticated computer, while a 128-bit key may take 1019 years to decrypt. Different encryption algorithms will provide varying key lengths for implementation.

13. What is a type of VPN that is generally transparent to the end user?

  • public
  • remote access
  • private
  • site-to-site

Explanation: With site-to-site VPNs, internal hosts have no knowledge that a VPN exists. Remote access VPNs support a client/server architecture, where the VPN client (remote host) gains secure access to the enterprise network via a VPN server device at the network edge. Public and private are not VPN types.

14. A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the internet. Which type of technology is required?

  • a dedicated ISP
  • a GRE IP tunnel
  • a leased line
  • a VPN gateway

Explanation: A GRE IP tunnel does not provide authentication or security. A leased line is not cost-effective compared to using high-speed broadband technology with VPNs. A dedicated ISP is not required when utilizing VPNs between multiple sites.

15. Which statement is true of site-to-site VPNs?

  • Individual hosts can enable and disable the VPN connection.
  • Internal hosts send normal, unencapsulated packets.
  • The VPN connection is not statically defined.
  • VPN client software is installed on each host.

Explanation: Site-to-site VPNs are statically defined VPN connections between two sites that use VPN gateways. The internal hosts do not require VPN client software and send normal, unencapsulated packets onto the network, where they are encapsulated by the VPN gateway.

16. How is the hash message authentication code (HMAC) algorithm used in an IPsec VPN?

  • to authenticate the IPsec peers
  • to create a secure channel for key negotiation
  • to guarantee message integrity
  • to protect IPsec keys during session negotiation

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. The hash message authentication code (HMAC) is a data integrity algorithm that uses a hash value to guarantee the integrity of a message.

17. What IPsec algorithm is used to provide data confidentiality?

  • AES
  • Diffie-Hellman
  • MD5
  • RSA
  • SHA

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm that is used for authentication.

18. What are two hashing algorithms used with IPsec to guarantee authenticity? (Choose two.)

  • AES
  • DH
  • MD5
  • RSA
  • SHA

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authentication) are MD5 and SHA.

19. What two IPsec algorithms provide encryption and hashing to protect interesting traffic? (Choose two.)

  • AES
  • DH
  • IKE
  • PSK
  • SHA

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two algorithms that can be used within an IPsec policy to protect interesting traffic are AES, which is an encryption protocol, and SHA, which is a hashing algorithm.

20. Which protocol creates a virtual unencrypted pointto-point VPN tunnel between Cisco routers?

  • GRE
  • IKE
  • IPsec
  • OSPF

Explanation: Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that encapsulates multiprotocol traffic between remote Cisco routers. GRE does not encrypt data. OSPF is an open-source routing protocol. IPsec is a suite of protocols that allow for the exchange of information that can be encrypted and verified. Internet Key Exchange (IKE) is a key management standard used with IPsec.

21. Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to a VPN gateway?

  • client-based SSL
  • clientless SSL
  • site-to-site using a pre-shared key
  • site-to-site using an ACL

Explanation: When a web browser is used to securely access the corporate network, the browser must use a secure version of HTTP to provide SSL encryption. A VPN client is not required to be installed on the remote host, so a clientless SSL connection is used.

22. Which IPsec security function utilizes encryption to protect data transfers with a key?

  • authentication
  • confidentiality
  • integrity
  • secure key exchange

Explanation: Confidentiality is a function of IPsec and utilizes encryption to protect data transfers with a key. Integrity is a function of IPsec and ensures that data arrives unchanged at the destination through the use of a hashing algorithm. Authentication is a function of IPsec and provides specific access to users and devices with valid authentication factors. Secure key exchange is a function of IPsec and allows two peers to maintain their private key confidentiality while sharing their public key.

23. Which of the following are service provider managed VPN solutions? (Choose two.)

  • client-based IPsec VPN
  • clientless SSL VPN
  • Frame Relay
  • Layer 3 MPLS VPN
  • remote-access VPN
  • site-to-site VPN

Explanation: VPNs can be managed and deployed as either enterprise VPNs (which is a common solution for securing enterprise traffic across the internet and includes site-to-site and remote-access VPNs) or service provider VPNs (that is, VPNs created and managed over the provider network, such as Layer 2 and Layer 3 MPLS VPNS, or legacy Frame Relay and ATM VPNs).

24. Which of the following are enterprise-managed remote-access VPNs? (Choose two.)

  • client-based IPsec VPN
  • clientless SSL VPN
  • Frame Relay
  • Layer 3 MPLS VPN
  • remote-access VPN
  • site-to-site VPN

Explanation: Enterprise managed remote-access VPNs are created dynamically when required. Remoteaccess VPNs include client-based IPsec VPNs and clientless SSL VPNs.

25. Which is a requirement of a site-to-site VPN?

  • Hosts connected using a web browser and an SSL connection
  • Hosts connected using client-based VPN software
  • A client/server architecture
  • VPN gateways at each end of the tunnel
  • VPN server at the edge of the company network

Explanation: Site-to-site VPNs are static and are used to connect entire networks. Hosts have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end that decapsulates the traffic.

26. How is the Diffie-Hellman algorithm used in the IPsec framework?

  • allows peers to exchange shared keys
  • guarantees message integrity
  • provides authentication
  • provides strong data encryption

Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. DH (Diffie-Hellman) is an algorithm used for key exchange. DH is a public key exchange method that allows two IPsec peers to establish a shared secret key over an insecure channel.

27. Which type of VPN involves passenger, carrier, and transport protocols?

  • DMVPN
  • GRE over IPsec
  • IPsec virtual tunnel interface
  • MPLS VPN

Explanation: In a GRE over IPsec tunnel, the term passenger protocol refers to the original packet that is to be encapsulated by GRE. The carrier protocol is the protocol that encapsulates the original passenger packet. The transport protocol is the protocol that will be used to forward the packet.

28. Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?

  • IPsec virtual tunnel interface
  • DMVPN
  • MPLS VPN
  • GRE over IPsec

Explanation: An IPsec VTI is a newer IPsec VPN technology that simplifies the configuration required to support multiple sites and remote access. IPsec VTI configurations use virtual interfaces to send and receive IP unicast and multicast encrypted traffic. Therefore, routing protocols are automatically supported without requiring configuration of GRE tunnels.

29. Which type of VPN connects using the Transport Layer Security (TLS) feature?

  • SSL VPN
  • GRE over IPsec
  • DMVPN
  • IPsec virtual tunnel interface
  • MPLS VPN

Explanation: When a client negotiates an SSL VPN connection with the VPN gateway, it connects using Transport Layer Security (TLS). TLS is the newer version of SSL and is sometimes expressed as SSL/TLS. The two terms are often used interchangeably.

30. Which description correctly identifies an MPLS VPN?

  • allows multicast and broadcast traffic over a secure site-to-site VPN
  • has both Layer 2 and Layer 3 implementations
  • involves a nonsecure tunneling protocol being encapsulated by IPsec
  • routes packets through virtual tunnel interfaces for encryption and forwarding.
  • uses the public key infrastructure and digital certificates.

Explanation: An MPLS VPN has both Layer 2 and Layer 3 implementations. A GRE over IPsec VPN involves a nonsecure tunneling protocol encapsulated by IPsec. An IPsec VTI VPN routes packets through virtual tunnel interfaces for encryption and forwarding. An IPsec VTI VPN and GRE over IPsec VPN allows multicast and broadcast traffic over a secure site-to-site VPN. An SSL VPN uses the public key infrastructure and digital certificates.

31. Which description correctly identifies an SSL VPN?

  • allows multicast and broadcast traffic over a secure site-to-site VPN
  • has both Layer 2 and Layer 3 implementations
  • involves a nonsecure tunneling protocol being encapsulated by IPsec
  • routes packets through virtual tunnel interfaces for encryption and forwarding
  • uses the public key infrastructure and digital certificates

Explanation: An SSL VPN uses the public key infrastructure and digital certificates. An MPLS VPN has both Layer 2 and Layer 3 implementations. A GRE over IPsec VPN involves a nonsecure tunneling protocol encapsulated by IPsec. An IPsec VTI VPN routes packets through virtual tunnel interfaces for encryption and forwarding. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site-to-site VPN.

32. Which two descriptions correctly identify an IPsec VTI VPN? (Choose two.)

  • allows multicast and broadcast traffic over a secure site-to-site VPN
  • has both Layer 2 and Layer 3 implementations
  • involves a nonsecure tunneling protocol being encapsulated by IPsec
  • routes packets through virtual tunnel interfaces for encryption and forwarding
  • uses the public key infrastructure and digital certificates

Explanation: An IPsec VTI VPN routes packets through virtual tunnel interfaces for encryption and forwarding. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site-to-site VPN. An MPLS VPN has both Layer 2 and Layer 3 implementations. A GRE over IPsec VPN involves a nonsecure tunneling protocol being encapsulated by IPsec. An SSL VPN uses the public key infrastructure and digital certificates.

33. Which two descriptions correctly identify a GRE over IPsec VPN? (Choose two.)

  • allows multicast and broadcast traffic over a secure site-to-site VPN
  • has both Layer 2 and Layer 3 implementations
  • involves a nonsecure tunneling protocol being encapsulated by IPsec
  • routes packets through virtual tunnel interfaces for encryption and forwarding
  • uses the public key infrastructure and digital certificates

Explanation: A GRE over IPsec VPN involves a nonsecure tunneling protocol being encapsulated by IPsec. An IPsec VTI VPN and a GRE over IPsec VPN allow multicast and broadcast traffic over a secure site-to-site VPN. An MPLS VPN has both Layer 2 and Layer 3 implementations. An IPsec VTI VPN routes packets through virtual tunnel interfaces for encryption and forwarding. An SSL VPN uses the public key infrastructure and digital certificates.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x