Site-to-Site IPSec VPN I

Description

NSE4 6.0 NSE4 6.0 Quiz on Site-to-Site IPSec VPN I, created by Marcos Avila on 21/07/2018.
Marcos Avila
Quiz by Marcos Avila, updated more than 1 year ago
Marcos Avila
Created by Marcos Avila almost 6 years ago
253
1

Resource summary

Question 1

Question
The three most used protocols in the suite are the following: (Select 3)
Answer
  • lnternet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)
  • Point – to – Point Tunneling Protocol (PPTP)
  • Secure Sockets Layer (SSL)

Question 2

Question
[blank_start]lnternet Key Exchange (IKE)[blank_end], which does the handshake, tunnel maintenance, and disconnection. [blank_start]Encapsulation Security Payload (ESP)[blank_end], which ensures data integrity andencryption. [blank_start]Authentication Header (AH)[blank_end], which offers only data integrity-not encryption.
Answer
  • lnternet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)

Question 3

Question
FortiGate uses ESP to transport the packet payload and authenticate.
Answer
  • True
  • False

Question 4

Question
IKE uses port
Answer
  • UDP 500
  • TCP 500
  • UDP 4500
  • TCP 4500

Question 5

Question
IKE uses if NAT-T is enabled in a NAT scenario:
Answer
  • UDP port 4500
  • TCP port 4500
  • UDP port 5000
  • TCP port 5000

Question 6

Question
SA
Answer
  • Security Association
  • Security Access

Question 7

Question
For phase 1, there are two possible negotiation modes that can be used:
Answer
  • main mode
  • aggressive mode
  • quick mode

Question 8

Question
Phase 2 uses only one negotiation mode:
Answer
  • quick mode
  • main mode
  • aggressive mode

Question 9

Question
AH is used by FortiGate
Answer
  • True
  • False

Question 10

Question
IKE
Answer
  • Internet Key Exchange
  • Internal Key Exchange
  • Internal Keep Exchange

Question 11

Question
ESP is
Answer
  • UDP encapsulated
  • TCP encapsulated

Question 12

Question
Authenticates or encrypts packets using the following protocols: (Select 3)
Answer
  • Internet Key Exchange (IKE)
  • Encapsulation Security Payload (ESP)
  • Authentication Header (AH)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Layer 2 Tunneling Protocol (L2TP)

Question 13

Question
Provides both data integrity and encryption:
Answer
  • Encapsulation Security Payload (ESP)
  • Internet Key Exchange (IKE)
  • Authentication Header (AH)

Question 14

Question
Easy configuration Few tunnels High central bandwidth Not fault tolerant Low system requirements on average, but high for center Scalable No direct communication between spokes
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 15

Question
Moderate configuration Medium number of tunnels Medium bandwidth in hub sites Some fault tolerance Medium system requirements Somewhat scalable Direct communication between some sites
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 16

Question
Complex configuration Many tunnels Low bandwidth Fault tolerant High system requirements Difficult to scale Direct communication between all sites
Answer
  • Hub-and-Spoke
  • Partial Mesh
  • Full Mesh

Question 17

Question
FortiOS provides two options for IPsec VPNs: route-based (also known as [blank_start]interface-based[blank_end]) or policy-based (also known as [blank_start]tunnel-mode[blank_end]).
Answer
  • interface-based
  • tunnel-mode
Show full summary Hide full summary

Similar

Circulatory System
bridget.watts97
Waves
kate.siena
Biology AQA 3.2.5 Mitosis
evie.daines
The Norman Conquest 1066-1087
adam.melling
IB Economics: International Trade
Han Zhang
Know the principles of electricity
Vito Martino
AQA Biology 12.1 cellular organisation
Charlotte Hewson
Physical Geography
clongworth25
Biology Unit 1a - GCSE - AQA
RosettaStoneDecoded
RadioTelefonia
Adriana Forero
Účto Fífa 2/6
Bára Drahošová