Pages

Saturday, November 21, 2015

GRE Tunneling over IPsec Questions

1. What is the minimum amount of additional header that GRE adds to a packet?
a. 16 bytes
b. 20 bytes
c. 24 bytes
d. 36 bytes
e. 48 bytes

2. Which of the following are valid options in a GRE header (select all that apply)?
a. GRE Header Length
b. Checksum Present
c. Key Present

d. External Encryption
e. Protocol

3. What is the purpose of a GRE tunnel interface?
a. It is always the tunnel source interface.
b. It is always the tunnel destination interface.
c. It is where the protocol that travels through the tunnel is configured.
d. It is the interface that maps to the physical tunnel port.
e. It is not used today.

4. When IPSec transport mode is used, how many IP headers are found in the GRE over IPsec
packet?
a. One—the original IP header is replicated when needed.
b. Two—the original IP header and the GRE IP header.
c. Two—the original IP header and the IPsec IP header.
d. Three—the original IP header, the GRE IP header, and the IPsec IP header.
e. Four—the original IP header, the GRE IP header, the IPsec IP header, and the outer IP
header.

5. What feature does GRE introduce that cannot be accomplished with normal IPsec?
a. GRE increases the packet size so that the minimum packet size is easily met.
b. GRE adds robust encryption to protect the inner packet.
c. GRE requires packet sequencing so that out-of-order packets can be reassembled
correctly.
d. GRE adds an additional IP header to further confuse packet-snooping devices.
e. GRE permits dynamic routing between end sites.

6. What are the basic components within the Secure GRE Wizard (select all that apply)?
a. Router interface configuration
b. GRE tunnel configuration
c. IPsec parameters configuration
d. Router authentication configuration
e. Routing protocols configuration

7. What is the IP address inside of the GRE tunnel used for?
a. The GRE tunnel peering point.
b. The IPsec tunnel peering point.
c. The routing protocols peering point.
d. The management interface of the router.
e. There is no IP address inside of the GRE tunnel.

8. Which option must be configured if a backup secure GRE tunnel is configured?
a. Source interface
b. Source IP address
c. Destination interface
d. Destination IP address
e. Destination router name

9. What methods are available for VPN authentication when used with a GRE tunnel (select all
that apply)?
a. Digital certificates
b. Pre-shared keys

c. Biometrics
d. OTP
e. KMA

10. When creating/selecting an IKE proposal, what does the Priority number indicate?
a. The Priority number is a sequence number.
b. The Priority number determines the encryption algorithm.
c. The Priority number helps determine the authentication method.
d. The Priority number is related to the Diffie-Hellman group.
e. The Priority number is necessary to select the hash algorithm.

11. How are IPsec transform sets used in the Secure GRE Wizard?
a. There must be a unique IPsec transform set for each VPN peer.
b. There must be a unique IPsec transform set for each GRE tunnel.
c. The two ends of a VPN must use the same IPsec transform set.
d. The same IPsec transform set can be used for all VPN peers.
e. Site-to-site IPsec VPN transform sets cannot be used for GRE over IPsec VPNs.

12. Which dynamic routing protocols can be configured in the GRE over IPsec tunnel (select all
that apply)?
a. RIP
b. OSPF
c. EIGRP

d. BGP
e. Static

13. Which routing options are appropriate when using both a primary and a backup GRE tunnel
(select all that apply)?
a. RIP
b. OSPF
c. EIGRP

d. BGP
e. Static

14. When using OSPF in the GRE over IPsec tunnel, what OSPF parameters must match so that
the two peers establish an OSPF adjacency (select all that apply)?
a. IP address of the GRE tunnel interface
b. Subnet of the GRE tunnel interface

c. OSPF area of the GRE tunnel interface
d. OSPF process ID of each router

e. Number of networks configured in OSPF on each router

15. In the Summary of the Configuration window, how can the displayed configuration be
modified?
a. Type changes directly into the scroll window and click the Apply button at the bottom
of the window.
b. Changes cannot be made from within any wizard.
c. Click the Modify button to return to the configuration windows.
d. Click the Back button to return to the configuration windows.
e. Click the Next button to proceed to the Modify Configuration window.

No comments:

Post a Comment