IT Questions Bank Which description correctly identifies an SSL VPN?ITExamAnswers asked 2 years ago • CCNA 3 v7Which description correctly identifies an MPLS VPN?ITExamAnswers asked 2 years ago • CCNA 3 v7Which type of VPN connects using the Transport Layer Security (TLS) feature?ITExamAnswers asked 4 years ago • CCNA 3 v7Which type of VPN supports multiple sites by applying configurations to virtual interfaces instead of physical interfaces?IT Administrator asked 4 years ago • CCNA 3 v7Which type of VPN involves passenger, carrier, and transport protocols?IT Administrator asked 4 years ago • CCNA 3 v7How is the Diffie-Hellman algorithm used in the IPsec framework?ITExamAnswers asked 2 years ago • CCNA 3 v7Which is a requirement of a site-to-site VPN?ITExamAnswers asked 4 years ago • CCNA, CCNA 3 v7, CCNA SecurityWhich of the following are enterprise-managed remote-access VPNs? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which of the following are service provider managed VPN solutions? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7Which IPsec security function utilizes encryption to protect data transfers with a key?ITExamAnswers asked 2 years ago • CCNA 3 v7Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to a VPN gateway?ITExamAnswers asked 2 years ago • CCNA 3 v7Which protocol creates a virtual unencrypted pointto-point VPN tunnel between Cisco routers?ITExamAnswers asked 2 years ago • CCNA 3 v7What two IPsec algorithms provide encryption and hashing to protect interesting traffic? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7What are two hashing algorithms used with IPsec to guarantee authenticity? (Choose two.)ITExamAnswers asked 2 years ago • CCNA 3 v7What IPsec algorithm is used to provide data confidentiality?ITExamAnswers asked 2 years ago • CCNA 3 v7