13.7.6 Practice Questions

A group of salesmen in your organization would like to access your private network through the
internet while they are traveling. You want to control access to the private network through a
single server.
Which solution should you implement?
VPN concentrator
IPS
DMZ
RADIUS
IDS

VPN concentrator

A salesperson in your organization spends most of her time traveling between customer sites.
After a customer visit, she must complete various managerial tasks, such as updating your
organization's order database.
Because she rarely comes back to your home office, she usually accesses the network from her
notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that
sensitive data could be exposed. To remedy this situation, you decide to configure her notebook
to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select two.)
Configure the VPN connection to use MS-CHAPv2.
Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec.
Configure the browser to send HTTPS requests directly to the Wi-Fi network without
going through the VPN connection.
Configure the VPN connection to use PPTP.

Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.

A VPN is used primarily for which purpose?
Allow remote systems to save on long-distance charges.
Support secured communications over an untrusted network.
Allow the use of network-attached printers.
Support the distribution of public web documents.

Support secured communications over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely
over an IP network. Which of the following protocols is suitable for this task?
PPP
PPTP
SLIP
NetBEUI

PPTP

Which of the following protocols can your portable computer use to connect to your company's
network via a virtual tunnel through the internet? (Select two.)
VNC
PPPoE
ICA
L2TP
PPTP

L2TP PPTP

IPsec is implemented through two separate protocols. What are these protocols called? (Select
two.)
EPS
ESP
SSL
AH
L2TP

ESP AH

Which of the following network layer protocols provides authentication and encryption services
for IP-based network traffic?
TCP
IPsec
L2TP
SSL

IPsec

Which of the following statements about SSL VPN are true? (Select two.)
Uses port 443.
Encapsulates packets by adding a GRE header.
Provides message integrity using HMAC.
Uses pre-shared keys for authentication.
Encrypts the entire communication session.
Uses UDP port 500.

Uses port 443. Encrypts the entire communication session.

Which of the following can route Layer 3 protocols across an IP network?
PPTP
SSL
GRE
IPsec

GRE

You have just downloaded a file. You create a hash of the file and compare it to the hash posted
on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website.
You can prove the source of the file.
You will be the only one able to open the downloaded file.
No one has read the file contents as it was downloaded.

Your copy is the same as the copy posted on the website.

Which of the following networking devices or services prevents the use of IPsec in most cases?
Router
Switch
Firewall
NAT

NAT

A group of salesmen in your organization would like to access your private network through the
internet while they are traveling. You want to control access to the private network through a
single server.
Which solution should you implement?
VPN concentrator
IPS
RADIUS
DMZ
IDS

VPN concentrator

13.7.6 Practice Questions - Subjecto.com

13.7.6 Practice Questions

Your page rank:

Total word count: 605
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

A group of salesmen in your organization would like to access your private network through the
internet while they are traveling. You want to control access to the private network through a
single server.
Which solution should you implement?
VPN concentrator
IPS
DMZ
RADIUS
IDS

VPN concentrator

A salesperson in your organization spends most of her time traveling between customer sites.
After a customer visit, she must complete various managerial tasks, such as updating your
organization’s order database.
Because she rarely comes back to your home office, she usually accesses the network from her
notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that
sensitive data could be exposed. To remedy this situation, you decide to configure her notebook
to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select two.)
Configure the VPN connection to use MS-CHAPv2.
Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec.
Configure the browser to send HTTPS requests directly to the Wi-Fi network without
going through the VPN connection.
Configure the VPN connection to use PPTP.

Configure the browser to send HTTPS requests through the VPN connection. Configure the VPN connection to use IPsec.

A VPN is used primarily for which purpose?
Allow remote systems to save on long-distance charges.
Support secured communications over an untrusted network.
Allow the use of network-attached printers.
Support the distribution of public web documents.

Support secured communications over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely
over an IP network. Which of the following protocols is suitable for this task?
PPP
PPTP
SLIP
NetBEUI

PPTP

Which of the following protocols can your portable computer use to connect to your company’s
network via a virtual tunnel through the internet? (Select two.)
VNC
PPPoE
ICA
L2TP
PPTP

L2TP PPTP

IPsec is implemented through two separate protocols. What are these protocols called? (Select
two.)
EPS
ESP
SSL
AH
L2TP

ESP AH

Which of the following network layer protocols provides authentication and encryption services
for IP-based network traffic?
TCP
IPsec
L2TP
SSL

IPsec

Which of the following statements about SSL VPN are true? (Select two.)
Uses port 443.
Encapsulates packets by adding a GRE header.
Provides message integrity using HMAC.
Uses pre-shared keys for authentication.
Encrypts the entire communication session.
Uses UDP port 500.

Uses port 443. Encrypts the entire communication session.

Which of the following can route Layer 3 protocols across an IP network?
PPTP
SSL
GRE
IPsec

GRE

You have just downloaded a file. You create a hash of the file and compare it to the hash posted
on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website.
You can prove the source of the file.
You will be the only one able to open the downloaded file.
No one has read the file contents as it was downloaded.

Your copy is the same as the copy posted on the website.

Which of the following networking devices or services prevents the use of IPsec in most cases?
Router
Switch
Firewall
NAT

NAT

A group of salesmen in your organization would like to access your private network through the
internet while they are traveling. You want to control access to the private network through a
single server.
Which solution should you implement?
VPN concentrator
IPS
RADIUS
DMZ
IDS

VPN concentrator

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending