Take as many assements as you can to improve your validate your skill rating
Total Questions: 16
1. What would be a good characterization of a VPN tunnel extablished between a telecommuter's PC using a VPN client software and a VPN Concentrator at the HQ location?
Correct Answer is : Remote access VPN
2. Which of the following describes the capability for a VPN terminating interface to simultaneously send IPSEC protected traffic and regular unprotected traffic?
Correct Answer is : Split tunneling
3. Which of the following is not a Layer 2 tunneling protocol?
Correct Answer is : IPSEC
4. Which of the following process is used in IPSEC to negotiate symmetric keys securely between endpoints over an unsecure intermediate media?
Correct Answer is : Diffie-Hellman Key Exchange
5. Which of the following is not performed during Phase 1 of ISAKMP?
Correct Answer is : Negotiate IPSEC SAs
6. A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
Correct Answer is : VPN
7. When were VPNs introduced into the commercial world?
Correct Answer is : Late 90’s
8. What protocol is NOT used in the operation of a VPN?
Correct Answer is : YMUM
9. Which of the following statements is NOT true concerning VPNs?
Correct Answer is : Is the backbone of the Internet
10. Traffic in a VPN is NOT ____________
Correct Answer is : Accessible from unauthorized public networks
11. VPNs are financially speaking __________
Correct Answer is : Usually cheaper than leased lines
12. Which layer 3 protocols can be transmitted over a L2TP VPN?
Correct Answer is : Both IP or IPX
13. ESP (Encapsulating Security Protocol) is defined in which of the following standards?
Correct Answer is : IPsec
14. L2F was developed by which company?
Correct Answer is : Cisco
15. Which layer of the OSI reference model does PPTP work at?
Correct Answer is : Layer 2
16. Which layer of the OSI reference model does IPsec work at?