Site-to-Site IPSec VPN I

Description

NSE4 6.0 NSE4 6.0 Quiz on Site-to-Site IPSec VPN I, created by Marcos Avila on 21/07/2018.
Marcos Avila
Quiz by Marcos Avila, updated more than 1 year ago
Marcos Avila
Created by Marcos Avila over 6 years ago
268
1

Resource summary

Question 1

Question
The three most used protocols in the suite are the following: (Select 3)
Answer
  • lnternet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)
  • Point – to – Point Tunneling Protocol (PPTP)
  • Secure Sockets Layer (SSL)

Question 2

Question
[blank_start]lnternet Key Exchange (IKE)[blank_end], which does the handshake, tunnel maintenance, and disconnection. [blank_start]Encapsulation Security Payload (ESP)[blank_end], which ensures data integrity andencryption. [blank_start]Authentication Header (AH)[blank_end], which offers only data integrity-not encryption.
Answer
  • lnternet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)

Question 3

Question
FortiGate uses ESP to transport the packet payload and authenticate.
Answer
  • True
  • False

Question 4

Question
IKE uses port
Answer
  • UDP 500
  • TCP 500
  • UDP 4500
  • TCP 4500

Question 5

Question
IKE uses if NAT-T is enabled in a NAT scenario:
Answer
  • UDP port 4500
  • TCP port 4500
  • UDP port 5000
  • TCP port 5000

Question 6

Question
SA
Answer
  • Security Association
  • Security Access

Question 7

Question
For phase 1, there are two possible negotiation modes that can be used:
Answer
  • main mode
  • aggressive mode
  • quick mode

Question 8

Question
Phase 2 uses only one negotiation mode:
Answer
  • quick mode
  • main mode
  • aggressive mode

Question 9

Question
AH is used by FortiGate
Answer
  • True
  • False

Question 10

Question
IKE
Answer
  • Internet Key Exchange
  • Internal Key Exchange
  • Internal Keep Exchange

Question 11

Question
ESP is
Answer
  • UDP encapsulated
  • TCP encapsulated

Question 12

Question
Authenticates or encrypts packets using the following protocols: (Select 3)
Answer
  • Internet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Layer 2 Tunneling Protocol (L2TP)

Question 13

Question
Provides both data integrity and encryption:
Answer
  • Encapsulation Security Payload (ESP)
  • Internet Key Exchange (IKE)
  • Authentication Header (AH)

Question 14

Question
Easy configuration Few tunnels High central bandwidth Not fault tolerant Low system requirements on average, but high for center Scalable No direct communication between spokes
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 15

Question
Moderate configuration Medium number of tunnels Medium bandwidth in hub sites Some fault tolerance Medium system requirements Somewhat scalable Direct communication between some sites
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 16

Question
Complex configuration Many tunnels Low bandwidth Fault tolerant High system requirements Difficult to scale Direct communication between all sites
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 17

Question
FortiOS provides two options for IPsec VPNs: route-based (also known as [blank_start]interface-based[blank_end]) or policy-based (also known as [blank_start]tunnel-mode[blank_end]).
Answer
  • interface-based
  • tunnel-mode
Show full summary Hide full summary

Similar

The Gettysburg Address
PrincessLaura
Memory - AQA Psychology Unit 1 GCSE
joshua6729
unit 1 f321 chemistry ocr
methmip
Language techniques: Macbeth
arnya_lewis
Narrative Writing
amberbob27
Macbeth - Charcters
a.agagon
NURS 310 EXAM 1 PRACTIC EXAM
harlacherha
Geography - Case Studies
jacobhatcher97
CUBAN MISSILE CRISIS
Olivia Andrews
GCSE REVISION TIMETABLE
megangeorgia03
World War I
Lydia Klein