TestOut IT Network Pro 10.4.8 Practice
Questions and Answers
Which IPSec subprotocol provides data encryption? - Answer- ESP
Which statement BEST describes IPsec when used in tunnel mode? - Answer- The
entire data packet, including headers, is encapsulated.
Which of the following VPN protocols is no longer considered secure? - Answer- PPTP
A group of salesmen in your organization would like to access your private network
through the internet while they are traveling. You want to control access to the private
network through a single server.
Which solution should you implement? - Answer- VPN concentrator
A salesperson in your organization spends most of her time traveling between customer
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organization's order database.
Because she rarely comes back to the home office, she usually accesses the network
from her notebook computer using Wi-Fi access provided by hotels, restaurants, and
airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are
concerned that sensitive data could be exposed. To remedy this situation, you decide to
configure her notebook to use a VPN when accessing the home network over an open
wireless connection.
Which key steps should you take when implementing this configuration? (Select two.) -
Answer- Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec.
Which of the following can route Layer 3 protocols across an IP network? - Answer-
GRE
Which of the following Network layer protocols provides authentication and encryption
services for IP-based network traffic? - Answer- IPsec
Which of the following purposes is a VPN primarily used for? - Answer- Support secured
communications over an untrusted network.
Questions and Answers
Which IPSec subprotocol provides data encryption? - Answer- ESP
Which statement BEST describes IPsec when used in tunnel mode? - Answer- The
entire data packet, including headers, is encapsulated.
Which of the following VPN protocols is no longer considered secure? - Answer- PPTP
A group of salesmen in your organization would like to access your private network
through the internet while they are traveling. You want to control access to the private
network through a single server.
Which solution should you implement? - Answer- VPN concentrator
A salesperson in your organization spends most of her time traveling between customer
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organization's order database.
Because she rarely comes back to the home office, she usually accesses the network
from her notebook computer using Wi-Fi access provided by hotels, restaurants, and
airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are
concerned that sensitive data could be exposed. To remedy this situation, you decide to
configure her notebook to use a VPN when accessing the home network over an open
wireless connection.
Which key steps should you take when implementing this configuration? (Select two.) -
Answer- Configure the browser to send HTTPS requests through the VPN connection.
Configure the VPN connection to use IPsec.
Which of the following can route Layer 3 protocols across an IP network? - Answer-
GRE
Which of the following Network layer protocols provides authentication and encryption
services for IP-based network traffic? - Answer- IPsec
Which of the following purposes is a VPN primarily used for? - Answer- Support secured
communications over an untrusted network.