• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Which two statements describe a remote access VPN? (Choose two.)

-It is used to connect individual hosts securely to a company network over the Internet.




- It may require VPN client software on hosts.

What are two key features of SSL? (Choose two.)

-web-based network access with minimum support costs




-native SSL encryption provides secure web-based network access

What are two reasons a company would use a VPN? (Choose two.)

- to connect remote users to the network




-to allow suppliers to access the network

A ______ is a secure, reliable, cost-effective way to allow remote users, branches, and suppliers to connect to resources on the company network.

VPN

Which encryption algorithm is recommended to be used for IPsec encryption?

AES

What method allows VPN traffic to remain confidential?

Encryption

Which is a requirement of a site-to-site VPN?

It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

When not in the office, network administrators in a company are required to establish an IPsec VPN connection to the company before accessing the intranet for network device management. Which Cisco Easy VPN component is needed for the administrators?

Cisco VPN Client

A network engineer is using a Cisco ASA as a proxy device to provide remote secure access to a company web server. What technology is being used?

Cisco Secure Mobility Clientless SSL VPN

Which three services are critical functions of the IPsec service? (Choose three.)

-Authentication




-Confidentiality




-Data Integrity

Which three statements are characteristics of generic routing encapsulation (GRE)? (Choose three.)

-GRE encapsulation supports any OSI Layer 3 protocol.




-GRE is stateless.




-GRE does not have strong security mechanisms.

What is an advantage offered by GRE tunnels?

support for IP multicast tunneling

IPsec functions at the ___________ layer of the OSI model, and protects and authenticates IP packets between IPsec devices.

-Network


-3