1. Two sites are connected using a VPN Tunnel. Which of the following is true.
a. ALL data flowing between the sites are encrypted.
b. Only TCP packets are allowed on VPN Tunnels.
c. Only IP packets are allowed on VPN tunnels.
d. None of the above.
b. Only TCP packets are allowed on VPN Tunnels.
c. Only IP packets are allowed on VPN tunnels.
d. None of the above.
2. Two sites are connected using a VPN Tunnel through which systems on the different network communicate. Where is the VPN client required to be installed?
a. VPN Clients are required to be installed on the systems.
b. VPN Clients are not required to be installed on the systems.
c. The VPN routers would automatically install the agents silently on the systems.
d. None of the above.
b. VPN Clients are not required to be installed on the systems.
c. The VPN routers would automatically install the agents silently on the systems.
d. None of the above.
3. Where are the session keys which would be used for data encryption over the VPN tunnel pre-configured on a remote access VPN architecture?
a. The session keys are pre-configured on the VPN client.
b. The session keys are pre-configured on the VPN router to which the client establishes connectivity.
c. The session keys are pre-configured on both the client and the VPN router
d. The session keys are derived dynamically for each session.
b. The session keys are pre-configured on the VPN router to which the client establishes connectivity.
c. The session keys are pre-configured on both the client and the VPN router
d. The session keys are derived dynamically for each session.
4. A remote access client establishes VPN connection with the remote VPN router. It is observed that the client is unable to access internet. What is the generic issue
a. All traffic would be routed through the VPN tunnel.
b. This is not an issue but is how remote access vpns work.
c. Split tunneling is not configured.
d. None of the above.
b. This is not an issue but is how remote access vpns work.
c. Split tunneling is not configured.
d. None of the above.
5. During which phase of IPSEC Tunnel negotiation is the keys derived for data encryption.
a. Phase 1
b. Phase 2.
c. Phase 3.
d. None of the above.
b. Phase 2.
c. Phase 3.
d. None of the above.
6. Two sites are connected using a site to site VPN tunnel. Is routing required to be configured on the routers for communication?
a. Yes
b. No
c. Not required if internet communication is available.
b. None of the above.
b. No
c. Not required if internet communication is available.
b. None of the above.
7. In a SSL VPN architecture, where are the session keys stored?
a. On the browser.
b. On the VPN server
c. On the SSL VPN client software.
d. The keys are derived dynamically.
b. On the VPN server
c. On the SSL VPN client software.
d. The keys are derived dynamically.
No comments:
Post a Comment