End of Chapter Solutions Template

advertisement
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 5, Page 195
Prof. Michael P. Harris
ITSY 2430 Intrusion Detection
Name: __________________
Chapter Review Questions,
Chapter Quiz 05
Date: ________
Virtual Private Networks (VPN)
1. A VPN is said to be virtual because the connections are
___________. (Choose all that apply.)
2. VPNs differ from leased lines in that they use which of the following
to make connections?
3. The VPN connection through which data passes from one endpoint to
another is called a(n) ______________.
4. Under what circumstances does a firewall need to be installed at the
endpoint of a VPN connection, and why?
5. A VPN that uses hardware to connect two networks is called which
of the following? (Choose all that apply.)
6. What term describes a set of procedures for enabling a VPN to
encrypt traffic?
Page 1 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 5, Page 195
Prof. Michael P. Harris
7. ____________ protects the integrity of data sent along the VPN
tunnel; the source and destination information of the actual data
packets is completely hidden.
8. PPTP uses a proprietary technology called __________ to encrypt
data that passes between the remote computer and the remote
access server.
9. What type of VPN is used to provide remote users with dial-up
access to a central office?
10. A group of authentication and encryption settings that two
computers negotiate to set up a secure VPN connection is called?
11. Computers in a VPN authenticate one another by means of which
encryption-related component?
12. What makes a VPN such a cost-effective option?
13. __________ provides authentication and encryption of TCP/IP
packets over a VPN or other connection, and is used primarily on
UNIX-based systems.
Page 2 of 3
Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796
Chapter 5, Page 195
Prof. Michael P. Harris
14. Companies that maintain VPNs with business partners often benefit
by using the same _____________. (Choose all that apply.)
15. IPSec provides for what security activity to take place before data is
encrypted or transmitted?
16. To access an application protected by Kerberos, which of the
following is required?
17. Which of the following adds encrypted authentication and support
for User Datagram Protocol (UDP)?
18. Internet Key Exchange (IKE) uses which of the following to encrypt a
packet’s header and data?
19. If a VPN is to be used with a firewall that performs NAT, IPSec
should be configured to work in which mode?
20. To perform encryption at both endpoints of a VPN, the keys must be
exchanged by participants who have a(n) _______________.
Page 3 of 3
Download