13-7-2006

9 September 2022
4.7 (114 reviews)
14 test answers

Unlock all answers in this set

Unlock answers (10)
question
A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)
answer
1) Configure the browser to send HTTPS requests through the VPN connection. 2) Configure the VPN connection to use IPsec.
question
A VPN is used primarily for which purpose?
answer
Support secured communications over an untrusted network.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP
question
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.)
answer
1) L2TP 2) PPTP
question
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
answer
1) ESP 2) AH
question
Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic?
answer
IPsec
question
Which of the following statements about SSL VPN are true? (Select two.)
answer
1) Uses port 443. 2) Encrypts the entire communication session.
question
Which of the following can route Layer 3 protocols across an IP network?
answer
GRE
question
You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
answer
Your copy is the same as the copy posted on the website.
question
Which of the following networking devices or services prevents the use of IPsec in most cases?
answer
NAT
question
A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
LAB: Configure a VPN Connection You are working on a small network. The owner has recently been awarded a contract position to assist with a research project. The owner will work from home on his Home-PC computer. To access the required data, he will need to make a VPN connection to the company through the internet.
answer
In the notification area, right-click the Network icon and select Open Network and Sharing Center. Select Set up a new connection or network to create the VPN. Select Connect to a workplace; then click Next. Select Use my Internet connection (VPN). Enter and select settings as necessary; then select Create. From the available networks, select Research VPN. In Network & Internet, select Research VPN. Select Advanced options. Under Connection properties, select Edit. Select the VPN type as required. Enter the username and password as required. Select Save.
question
LAB: Configure a Mobile Device VPN Connection You work as the IT security administrator for a small corporate network. You recently set up the Remote Access VPN feature on your network security appliance to provide you and your fellow administrators with secure access to your network. you are currently at home and would like to connect your iPad to the VPN. Your iPad is connected to your home wireless network.
answer
Select Settings. Select Wi-Fi. Verify that you are connected to the Home-Wireless network. From the left menu, select General. Scroll down and select VPN. Select Add VPN Configuration. Select IPSec. In the Description field, enter the description. In the Server field, enter server IP address. In the Account field, enter account admin username. In the Secret field, enter the pass phrase. Click Save. Under VPN Configuration, set Not Connected to ON. Enter L3tM31nN0w (0 = zero) as the password. Click OK.