- Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?
- It will be sent unencrypted.
- It will be sent encrypted.
- It will be blocked.
- It will be discarded.
- What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three.)
- HTTPS
- SSH
- AH
- ISAKMP
- NTP
- ESP
- Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?
- The length of a key does not affect the degree of security.
- The shorter the key, the harder it is to break.
- The length of a key will not vary between encryption algorithms.
- The longer the key, the more key possibilities exist.
- What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?
- By applying the ACL on a public interface, multiple crypto ACLs can be built to prevent public users from connecting to the VPN-enabled router.
- Multiple crypto ACLs can define multiple remote peers for connecting with a VPN-enabled router across the Internet or network.
- Multiple crypto ACLs can be configured to deny specific network traffic from crossing a VPN.
- When multiple combinations of IPsec protection are being chosen, multiple crypto ACLs can define different traffic types.
- Consider the following configuration on a Cisco ASA:
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
What is the purpose of this command?- to define the ISAKMP parameters that are used to establish the tunnel
- to define the encryption and integrity algorithms that are used to build the IPsec tunnel
- to define what traffic is allowed through and protected by the tunnel
- to define only the allowed encryption algorithms
- Which transform set provides the best protection?
- crypto ipsec transform-set ESP-DES-SHA esp-aes-256 esp-sha-hmac
- crypto ipsec transform-set ESP-DES-SHA esp-3des esp-sha-hmac
- crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
- crypto ipsec transform-set ESP-DES-SHA esp-aes esp-des esp-sha-hmac
- Which three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three.)
- 168
- 50
- 169
- 501
- 500
- 51
- When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?
- after the tunnel is created, but before traffic is sent
- only during Phase 2
- only during Phase 1
- during both Phase 1 and 2
- In which situation would the Cisco Discovery Protocol be disabled?
- when a Cisco VoIP phone attaches to a Cisco switch
- when a Cisco switch connects to another Cisco switch
- when a Cisco switch connects to a Cisco router
- when a PC with Cisco IP Communicator installed connects to a Cisco switch
- Which two statements accurately describe characteristics of IPsec? (Choose two.)
- IPsec works at the transport layer and protects data at the network layer.
- IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
- IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
- IPsec is a framework of open standards that relies on existing algorithms.
- IPsec works at the network layer and operates over all Layer 2 protocols.
- IPsec works at the application layer and protects all application data.
- Which action do IPsec peers take during the IKE Phase 2 exchange?
- exchange of DH keys
- negotiation of IPsec policy
- negotiation of IKE policy sets
- verification of peer identity
- Which three statements describe the IPsec protocol framework? (Choose three.)
- AH provides integrity and authentication.
- ESP provides encryption, authentication, and integrity.
- AH uses IP protocol 51.
- AH provides encryption and integrity.
- ESP uses UDP protocol 50.
- ESP requires both authentication and encryption.
- Which statement accurately describes a characteristic of IPsec?
- IPsec works at the application layer and protects all application data.
- IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
- IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
- IPsec works at the transport layer and protects data at the network layer.
- IPsec is a framework of open standards that relies on existing algorithms.
- Which two IPsec protocols are used to provide data integrity?
- SHA
- AES
- DH
- MD5
- RSA
- What is the function of the Diffie-Hellman algorithm within the IPsec framework?
- provides authentication
- allows peers to exchange shared keys
- guarantees message integrity
- provides strong data encryption
- Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?
- MD5
- AES
- SHA
- DH
- What is needed to define interesting traffic in the creation of an IPsec tunnel?
- security associations
- hashing algorithm
- access list
- transform set
- Refer to the exhibit. What algorithm will be used for providing confidentiality?
- RSA
- Diffie-Hellman
- DES
- AES
- Which technique is necessary to ensure a private transfer of data using a VPN?
- encryption
- authorization
- virtualization
- scalability
- Which statement describes a VPN?
- VPNs use open source virtualization software to create the tunnel through the Internet.
- VPNs use virtual connections to create a private network through a public network.
- VPNs use dedicated physical connections to transfer data between remote users.
- VPNs use logical connections to create public networks through the Internet.
- Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
- ESP
- IPsec
- MD5
- AES
- What is the purpose of NAT-T?
- enables NAT for PC-based VPN clients
- permits VPN to work when NAT is being used on one or both ends of the VPN
- upgrades NAT for IPv4
- allows NAT to be used for IPv6 addresses
- Which term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface?
- GRE
- split tunneling
- MPLS
- hairpinning
- What is an important characteristic of remote-access VPNs?
- The VPN configuration is identical between the remote devices.
- Internal hosts have no knowledge of the VPN.
- Information required to establish the VPN must remain static.
- The VPN connection is initiated by the remote user.
- Which type of site-to-site VPN uses trusted group members to eliminate point-to-point IPsec tunnels between the members of a group?
- DMVPN
- GRE
- GETVPN
- MPLS
- Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?
- R1(config)# crypto isakmp key cisco123 address 209.165.200.227
R2(config)# crypto isakmp key cisco123 address 209.165.200.226 - R1(config)# crypto isakmp key cisco123 address 209.165.200.226
R2(config)# crypto isakmp key cisco123 address 209.165.200.227 - R1(config)# crypto isakmp key cisco123 hostname R1
R2(config)# crypto isakmp key cisco123 hostname R2 - R1(config)# crypto isakmp key cisco123 address 209.165.200.226
R2(config)# crypto isakmp key secure address 209.165.200.227
- R1(config)# crypto isakmp key cisco123 address 209.165.200.227
Home »
» CCNA Security - Chapter 8 Exam Answers Download PDF Test Online
0 commentaires:
Enregistrer un commentaire