CCNA Security Chapter 8

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?
2.
1 point
Which factor is a drawback of providing remote connectivity and work solutions to employees?
3.
1 point
Which statement describes an important characteristic of a site-to-site VPN?
4.
1 point
When using ESP tunnel mode, which portion of the packet is not authenticated?
5.
1 point
The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks?
6.
1 point
Which action do IPsec peers take during the IKE Phase 2 exchange?
7.
1 point
Which authentication method is available when specifying a method list for group policy lookup using the CCP Easy VPN Server wizard?
8.
1 point
Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
9.
1 point
When CCP Quick Setup is used to configure a VPN-capable router, what is the strongest level of encryption allowed?
10.
1 point
What is the default IKE policy value for encryption?
11.
1 point
What are two benefits of an SSL VPN? (Choose two.)
12.
1 point
Refer to the exhibit. Based on the CCP settings that are shown, which Easy VPN Server component is being configured?
13.
1 point
Which two statements accurately describe characteristics of IPsec? (Choose two.)
14.
1 point
When verifying IPsec configurations, which show command displays the encryption algorithm, hash algorithm, authentication method, and Diffie-Hellman group configured, as well as default settings?
15.
1 point
What protocol is used by IPsec to calculate shared keys and to negotiate the parameters to be used by IPsec SAs?
16.
1 point
Which two authentication methods can be configured when using the CCP Site-to-Site VPN wizard? (Choose two.)
17.
1 point
What are two characteristics of SSL VPNs? (Choose two.)
18.
1 point
What can be used as a VPN gateway when setting up a site-to-site VPN?
19.
1 point
With the Cisco Easy VPN feature, which process ensures that a static route is created on the Cisco Easy VPN Server for the internal IP address of each VPN client?
20.
1 point
A user launches Cisco VPN Client software to connect remotely to a VPN service. What does the user select before entering the username and password?
21.
1 point
What is the purpose of the “Generate Mirror…” button in site-to-site VPN wizard of CCP?
22.
1 point
What VPN solution uses a server to push IPsec policies to mobile clients so that they can access company resources over a secure IPsec tunnel?
23.
1 point
A network administrator is planning to implement centralized management of Cisco VPN devices to simplify VPN deployment for remote offices and teleworkers. Which Cisco IOS feature would provide this solution?
24.
1 point
A network administrator plans to deploy an SSL VPN on a Cisco IOS router. Which SSL VPN mode would require the user to download a Java applet to connect to POP3, SMTP, and SSH services?
25.
1 point
When configuring an IPsec VPN, what is used to define the traffic that is sent through the IPsec tunnel and protected by the IPsec process?
26.
1 point
Refer to the exhibit. Which two IPsec framework components are valid options when configuring an IPsec VPN on a Cisco ISR router? (Choose two.)
27.
1 point
Which UDP port must be permitted on any IP interface used to exchange IKE information between security gateways?
28.
1 point
Refer to the exhibit. A site-to-site VPN is required from R1 to R3. The administrator is using the CCP Site-to-Site VPN wizard on R1. Which IP address should the administrator enter in the highlighted field?
29.
1 point
A network administrator has acquired two different VPN-capable routers that will be installed in a network. Which factor must be verified between two routers prior to configuring a VPN tunnel?
30.
1 point
What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
31.
1 point
How many bytes of overhead are added to each IP packet while it is transported through a GRE tunnel?
32.
1 point
Which statement describes the operation of the IKE protocol?
33.
1 point
Which three statements describe the IPsec protocol framework? (Choose three.)
34.
1 point
What is required for a host to use an SSL VPN to connect to a remote network device?
35.
1 point
Refer to the exhibit. A network administrator is troubleshooting a GRE VPN tunnel between R1 and R2. Assuming the R2 GRE configuration is correct and based on the running configuration of R1, what must the administrator do to fix the problem?
36.
1 point
Refer to the exhibit. Based on the CCP screen that is shown, which two conclusions can be drawn about the IKE policy that is being configured? (Choose two.)