SChapter 8

Is this your test? Login to manage it. If not, you can generate an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three.)
2.
1 point
Which two statements accurately describe characteristics of IPsec? (Choose two.)
3.
1 point
Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
4.
1 point
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
5.
1 point
Consider the following configuration on a Cisco ASA:
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

What is the purpose of this command?
6.
1 point
What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
7.
1 point
Which transform set provides the best protection?
8.
1 point
What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
9.
1 point
In which situation would the Cisco Discovery Protocol be disabled?
10.
1 point
When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?