Basics of IPsec
What is the primary purpose of the IPsec protocol?
- To provide security for internet protocol communications
- To allocate IP addresses automatically
- To monitor internet bandwidth usage
- To connect devices using wireless signals
- To generate random encryption algorithms
Components of IPsec VPNs
Which of the following is NOT a main component of an IPsec VPN?
- Internet Key Exchange (IKE)
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Packet Filtering Algorithm (PFA)
- Authentication Hedder (typo version)
Understanding VPN
A virtual private network (VPN) most commonly does which of the following?
- Connect remote users together using a public network
- Increase the internet download speed
- Block all unauthorized emails
- Replace hardware firewalls
- Offer unencrypted data transmission
IPsec Modes
What are the two modes in which the Encapsulating Security Payload (ESP) operates?
- Transport mode and Tunnel mode
- Peer mode and Node mode
- Client mode and Server mode
- Public mode and Private mode
- Transpoort mode and Tunel mode (spelling mistakes)
Encryption Algorithms
Which of the following is used for secure key exchange in VPNs?
- Diffie-Hellman
- SHA-256
- MD5
- Base64
- DHif-Hellman (typo)
IPsec Protocol Numbers
Which protocol numbers are used by IPsec for AH and ESP, respectively?
- 51 for AH and 50 for ESP
- 50 for AH and 51 for ESP
- 500 for AH and 1500 for ESP
- 4500 for AH and 500 for ESP
- 55 for AH and 60 for ESP
NAT Traversal in VPNs
What is the main purpose of NAT Traversal in the context of VPNs?
- To allow IPsec traffic to pass through devices performing Network Address Translation
- To speed up encryption algorithms
- To replace IP addresses with random numbers
- To disable firewall rules
- To create new subnets automatically
DMVPN Components
Which protocol does DMVPN use to help spokes find each others' public IP addresses?
- NHRP
- OSPF
- RIP
- GREP
- NHRB (typo)
CIA Principles
In the context of security, what does CIA stand for?
- Confidentiality, Integrity, Availability
- Central Internet Authority
- Certification, Information, Access
- Control, Input, Audit
- Confidenciality, Integrety, Availibility (typos)
Route-based vs Policy-based VPNs
Which statement best describes a route-based VPN?
- It relies on routing tables to determine which traffic is protected by the VPN
- It uses access control lists to select protected traffic
- It is only compatible with private networks
- It encrypts all broadcast traffic by default
- It blocks all peer-to-peer connections