caze00

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which statement accurately describes a characteristic of IPsec?
2.
1 point
Which type of site-to-site VPN uses trusted group members to eliminate point-to-point IPsec tunnels between the members of a group?
3.
1 point
Which two IPsec protocols are used to provide data integrity?
4.
1 point
What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
5.
1 point
In which situation would the Cisco Discovery Protocol be disabled?
6.
1 point
What is needed to define interesting traffic in the creation of an IPsec tunnel?
7.
1 point
Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?
8.
1 point
Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?
9.
1 point
Which two statements accurately describe characteristics of IPsec? (Choose two.)
10.
1 point
Which statement describes a VPN?
11.
1 point
Which three statements describe the IPsec protocol framework? (Choose three.)
12.
1 point
Refer to the exhibit. What algorithm will be used for providing confidentiality?
13.
1 point
What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
14.
1 point
What is the purpose of NAT-T?
15.
1 point
Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
16.
1 point
Consider the following configuration on a Cisco ASA:
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
What is the purpose of this command?
17.
1 point
Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
18.
1 point
Which term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface?
19.
1 point
Which action do IPsec peers take during the IKE Phase 2 exchange?
20.
1 point
When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?
21.
1 point
Which transform set provides the best protection?
22.
1 point
7. Which three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three.)
23.
1 point
Which technique is necessary to ensure a private transfer of data using a VPN?
24.
1 point
What is an important characteristic of remote-access VPNs?
25.
1 point
Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
26.
1 point
What is the function of the Diffie-Hellman algorithm within the IPsec framework?