Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 5, Page 195 Prof. Michael P. Harris ITSY 2430 Intrusion Detection Name: __________________ Chapter Review Questions, Chapter Quiz 05 Date: ________ Virtual Private Networks (VPN) 1. A VPN is said to be virtual because the connections are ___________. (Choose all that apply.) 2. VPNs differ from leased lines in that they use which of the following to make connections? 3. The VPN connection through which data passes from one endpoint to another is called a(n) ______________. 4. Under what circumstances does a firewall need to be installed at the endpoint of a VPN connection, and why? 5. A VPN that uses hardware to connect two networks is called which of the following? (Choose all that apply.) 6. What term describes a set of procedures for enabling a VPN to encrypt traffic? Page 1 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 5, Page 195 Prof. Michael P. Harris 7. ____________ protects the integrity of data sent along the VPN tunnel; the source and destination information of the actual data packets is completely hidden. 8. PPTP uses a proprietary technology called __________ to encrypt data that passes between the remote computer and the remote access server. 9. What type of VPN is used to provide remote users with dial-up access to a central office? 10. A group of authentication and encryption settings that two computers negotiate to set up a secure VPN connection is called? 11. Computers in a VPN authenticate one another by means of which encryption-related component? 12. What makes a VPN such a cost-effective option? 13. __________ provides authentication and encryption of TCP/IP packets over a VPN or other connection, and is used primarily on UNIX-based systems. Page 2 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 5, Page 195 Prof. Michael P. Harris 14. Companies that maintain VPNs with business partners often benefit by using the same _____________. (Choose all that apply.) 15. IPSec provides for what security activity to take place before data is encrypted or transmitted? 16. To access an application protected by Kerberos, which of the following is required? 17. Which of the following adds encrypted authentication and support for User Datagram Protocol (UDP)? 18. Internet Key Exchange (IKE) uses which of the following to encrypt a packet’s header and data? 19. If a VPN is to be used with a firewall that performs NAT, IPSec should be configured to work in which mode? 20. To perform encryption at both endpoints of a VPN, the keys must be exchanged by participants who have a(n) _______________. Page 3 of 3