QUESTIONS AND ANSWERS
(GRADED A+)
Which layer of the OSI model is the Data Link Layer? - ANSWER-Layer 2
Chad is a network engineer. He is tasked with selecting a virtual private network
(VPN) platform for his company. He chooses a solution that is inexpensive and runs
on UNIX, although it is less scalable and less stable than other solutions. What has
he chosen? - ANSWER-Operating system-based VPN
Your sales department likes to stream professional sports games across the
computer network on Wednesday afternoons, causing VPN performance issues
during that time. What is the most likely cause of the performance issues? -
ANSWER-Traffic spike
Felicia is a network engineer deploying a virtual private network (VPN) solution. The
VPN operates using Secure Shell (SSH). When asked by a new help desk tech
about which layer of the OSI model it employs, how does Felicia answer? -
ANSWER-7
Internet Protocol Security (IPSec) is a standards-based protocol suite designed
specifically for securing ____________ communications. - ANSWER-Internet
Protocol (IP)
Which of the following can perform authentication to provide integrity protection for
the outermost IP header? - ANSWER-Authentication Header (AH)
Which of the following provides integrity protection for packet headers and data and
can optionally provide replay protection and access protection? - ANSWER-
Authentication Header (AH)
Maria is a new network engineer for a company that was established more than 30
years ago. She is examining the IT infrastructure and discovers that the virtual
private network (VPN) solution employs an older encryption protocol for backward
compatibility. This protocol has largely been replaced, but it used to be popular in
early VPN solutions. What is this protocol? - ANSWER-Layer 2 Tunneling Protocol
(L2TP)
Which of the following is a protocol that supports Advanced Encryption Standard
(AES) with 128, 192, and 256 keys? - ANSWER-Transport Layer Security (TLS)
Chris is a network engineer deploying a virtual private network (VPN) solution. He
needs an implementation of Secure Sockets Layer/Transport Layer Security
(SSL/TLS) that adds a layer of authentication to the access. What feature does he
require? - ANSWER-Bidirectional authentication
, Which of the following statements is TRUE of an Internet Protocol Security (IPSec)
virtual private network (VPN) when compared to a Secure Sockets Layer/Transport
Layer Security (SSL/TLS) VPN? - ANSWER-It requires client software
Which of the following is a protocol that replaces the use of telnet and rlogin to log in
to a shell on a remote host? - ANSWER-Secure Shell (SSH)
Mei is a new network technician for a mid-sized company. She is trying to determine
what is causing a performance lag on the infrastructure's virtual private network
(VPN). The lags typically occur between 8 a.m. and 9 a.m., and again between 1
p.m. and 2 p.m. What is the most likely cause? - ANSWER-Peak usage loads
The configuration, location, software version, and underlying operating system of a
virtual private network (VPN) are all factors that are most likely to affect: - ANSWER-
Stability
Virtual private networks (VPNs) and which standard have historically suffered from
conflicts when used together? - ANSWER-Network Address Translation (NAT)
Which of the following is an advantage of Secure Sockets Layer/Transport Layer
Security (SSL/TLS) virtual private networks (VPNs) versus Internet Protocol Security
(IPSec) VPNs? - ANSWER-No NAT problems
The IT department of a company has just rolled out a virtual private network (VPN)
solution that offers greater flexibility, delegation of management, and added security
over the previous implementation. What is this solution called? - ANSWER-Secure
Sockets Layer (SSL) virtualization
Which of the following is a core Internet Protocol Security (IPSec) protocol that
provides encryption only, both encryption and integrity protection, or integrity
protection only in all but the oldest IPSec implementations? - ANSWER-
Encapsulating Security Payload (ESP)
Which Internet Protocol Security (IPSec) core component negotiates, creates, and
manages security associations? - ANSWER-Internet Key Exchange (IKE)
Which of the following is the protocol used with HTTPS for encrypting
communications to and from websites? - ANSWER-Secure Sockets Layer/Transport
Layer Security (SSL/TLS)
A software-based virtual private network (VPN) may be part of a server operating
system, part of an appliance operating system, or a third-party add-on software
solution. - ANSWER-True
A hardware virtual private network (VPN) is a standalone device, dedicated to
managing VPN functions. - ANSWER-True
The functionalities of software and hardware virtual private network (VPN) solutions
are fundamentally different. - ANSWER-False