GRE Quiz: VPNs, IPsec, and Secure Networking Quiz

  1. Basics of IPsec

    What is the primary purpose of the IPsec protocol?

    1. To provide security for internet protocol communications
    2. To allocate IP addresses automatically
    3. To monitor internet bandwidth usage
    4. To connect devices using wireless signals
    5. To generate random encryption algorithms
  2. Components of IPsec VPNs

    Which of the following is NOT a main component of an IPsec VPN?

    1. Internet Key Exchange (IKE)
    2. Authentication Header (AH)
    3. Encapsulating Security Payload (ESP)
    4. Packet Filtering Algorithm (PFA)
    5. Authentication Hedder (typo version)
  3. Understanding VPN

    A virtual private network (VPN) most commonly does which of the following?

    1. Connect remote users together using a public network
    2. Increase the internet download speed
    3. Block all unauthorized emails
    4. Replace hardware firewalls
    5. Offer unencrypted data transmission
  4. IPsec Modes

    What are the two modes in which the Encapsulating Security Payload (ESP) operates?

    1. Transport mode and Tunnel mode
    2. Peer mode and Node mode
    3. Client mode and Server mode
    4. Public mode and Private mode
    5. Transpoort mode and Tunel mode (spelling mistakes)
  5. Encryption Algorithms

    Which of the following is used for secure key exchange in VPNs?

    1. Diffie-Hellman
    2. SHA-256
    3. MD5
    4. Base64
    5. DHif-Hellman (typo)
  6. IPsec Protocol Numbers

    Which protocol numbers are used by IPsec for AH and ESP, respectively?

    1. 51 for AH and 50 for ESP
    2. 50 for AH and 51 for ESP
    3. 500 for AH and 1500 for ESP
    4. 4500 for AH and 500 for ESP
    5. 55 for AH and 60 for ESP
  7. NAT Traversal in VPNs

    What is the main purpose of NAT Traversal in the context of VPNs?

    1. To allow IPsec traffic to pass through devices performing Network Address Translation
    2. To speed up encryption algorithms
    3. To replace IP addresses with random numbers
    4. To disable firewall rules
    5. To create new subnets automatically
  8. DMVPN Components

    Which protocol does DMVPN use to help spokes find each others' public IP addresses?

    1. NHRP
    2. OSPF
    3. RIP
    4. GREP
    5. NHRB (typo)
  9. CIA Principles

    In the context of security, what does CIA stand for?

    1. Confidentiality, Integrity, Availability
    2. Central Internet Authority
    3. Certification, Information, Access
    4. Control, Input, Audit
    5. Confidenciality, Integrety, Availibility (typos)
  10. Route-based vs Policy-based VPNs

    Which statement best describes a route-based VPN?

    1. It relies on routing tables to determine which traffic is protected by the VPN
    2. It uses access control lists to select protected traffic
    3. It is only compatible with private networks
    4. It encrypts all broadcast traffic by default
    5. It blocks all peer-to-peer connections