Network Security - Modules 18-19

Network Security - Modules 18-19

12th Grade

26 Qs

quiz-placeholder

Similar activities

Slime Rancher

Slime Rancher

1st - 12th Grade

21 Qs

Computers

Computers

KG - Professional Development

21 Qs

UH 1-MYOB Manufaktur

UH 1-MYOB Manufaktur

12th Grade

25 Qs

TIK01

TIK01

12th Grade

25 Qs

FNaF 2

FNaF 2

5th Grade - University

24 Qs

GAD Review - Game Industry

GAD Review - Game Industry

9th - 12th Grade

22 Qs

Fun Computing KS2

Fun Computing KS2

3rd - 12th Grade

22 Qs

Quiz 1

Quiz 1

9th - 12th Grade

21 Qs

Network Security - Modules 18-19

Network Security - Modules 18-19

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Logan Prewitt

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

1. Which two statements describe the IPsec protocol framework? (Choose two.)

AH uses IP protocol 51.

AH provides integrity and authentication.

  • AH provides encryption and integrity.

  • ESP uses UDP protocol 51.

  • AH provides both authentication and encryption.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. What technology is used to negotiate security associations and calculate shared keys for an IPsec VPN tunnel?

PSK

SHA

3DES

IKE

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. What are the two modes used in IKE Phase 1? (Choose two.)

passive

primary

main

secondary

aggressive

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. What takes place during IKE Phase 2 when establishing an IPsec VPN?

  • Traffic is exchanged between IPsec peers.

IPsec security associations are exchanged.

  • ISAKMP security associations are exchanged.

  • Interesting traffic is identified.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Configure the ISAKMP policies for IKE Phase 2.

Step 1

Step 2

Step 3

Step 4

Step 5

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Apply the IPsec Policy.

Step 1

Step 2

Step 3

Step 4

Step 5

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Verify that the IPsec Tunnel is operational.

Step 1

Step 2

Step 3

Step 4

Step 5

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?