Network Security - Modules 18-19

Network Security - Modules 18-19

12th Grade

26 Qs

quiz-placeholder

Similar activities

Test Perangkat jaringan Komputer dan Internet

Test Perangkat jaringan Komputer dan Internet

12th Grade

25 Qs

iGCSE Computer Science: Networks

iGCSE Computer Science: Networks

9th - 12th Grade

24 Qs

Networking Concepts

Networking Concepts

12th Grade - University

25 Qs

Review Sheet Quiz - Beginning of the Year

Review Sheet Quiz - Beginning of the Year

9th Grade - University

30 Qs

Ch5 Review, MSCA Ex 70-411 Guide

Ch5 Review, MSCA Ex 70-411 Guide

12th Grade

25 Qs

Networking 3/4 Chapter 10 Test Review

Networking 3/4 Chapter 10 Test Review

9th - 12th Grade

27 Qs

98-366 Lesson 8 Infrastructures & Security

98-366 Lesson 8 Infrastructures & Security

11th Grade - University

25 Qs

98-366 Lesson 8 Network Infrastructures and Security

98-366 Lesson 8 Network Infrastructures and Security

10th Grade - University

24 Qs

Network Security - Modules 18-19

Network Security - Modules 18-19

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Logan Prewitt

Used 5+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

1. Which two statements describe the IPsec protocol framework? (Choose two.)

AH uses IP protocol 51.

AH provides integrity and authentication.

  • AH provides encryption and integrity.

  • ESP uses UDP protocol 51.

  • AH provides both authentication and encryption.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

2. What technology is used to negotiate security associations and calculate shared keys for an IPsec VPN tunnel?

PSK

SHA

3DES

IKE

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

3. What are the two modes used in IKE Phase 1? (Choose two.)

passive

primary

main

secondary

aggressive

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. What takes place during IKE Phase 2 when establishing an IPsec VPN?

  • Traffic is exchanged between IPsec peers.

IPsec security associations are exchanged.

  • ISAKMP security associations are exchanged.

  • Interesting traffic is identified.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Configure the ISAKMP policies for IKE Phase 2.

Step 1

Step 2

Step 3

Step 4

Step 5

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Apply the IPsec Policy.

Step 1

Step 2

Step 3

Step 4

Step 5

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

5. A site-to-site IPsec VPN is to be configured. Place the configuration steps in order.

Verify that the IPsec Tunnel is operational.

Step 1

Step 2

Step 3

Step 4

Step 5

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?