ENSA - Module 8 - VPN and IP Sec Concepts

ENSA - Module 8 - VPN and IP Sec Concepts

Professional Development

15 Qs

quiz-placeholder

Similar activities

All about Google Workspace

All about Google Workspace

Professional Development

15 Qs

ISMS Assessment

ISMS Assessment

Professional Development

20 Qs

PRE-EVAL

PRE-EVAL

Professional Development

10 Qs

Ecografía

Ecografía

Professional Development

20 Qs

Dahua Home Juni 2021

Dahua Home Juni 2021

Professional Development

15 Qs

NextGen MCSA -Theory Test

NextGen MCSA -Theory Test

Professional Development

10 Qs

6219 unit 101 H&S revision

6219 unit 101 H&S revision

Professional Development

17 Qs

วัดพื้นฐาน Google Site

วัดพื้นฐาน Google Site

Professional Development

10 Qs

ENSA - Module 8 - VPN and IP Sec Concepts

ENSA - Module 8 - VPN and IP Sec Concepts

Assessment

Quiz

Instructional Technology

Professional Development

Practice Problem

Hard

Created by

Andrew Cruickshank

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two Ipsec protocols are used to provide data integrity? (choose two)

DH
AES
SHA
RSA
MD5

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of traffic allows multicast and broadcast traffic over a secure site-to-site VPN?

GRE over IPsec
SSL VPN
Dynamic multipoint VPN
IPsec virtual tunnel interface
IPsec

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of VPN connects using the Transport Layer Security (TLS) feature?

IPsec
Dynamic mulipoint VPN
SSL VPN
GRE over IPsec
DH

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two end points can be on the other side of an ASA site-to-site VPN? (Choose two.)

DSL switch
Multilayer switch
MPLS switch
Router
Another ASA

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the two fundamental Dynamic Multipoint VPN tunnel types? (Choose two.)

Site-to-site
Hub-and-Spoke
Client-to-Site
Spoke-to-Spoke
Server-to-Client

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type pf VPN uses a hub-and-spoke configuration to establish a full mesh topology?

MPLS VPN
Dynamic multipoint VPN
GRE over IPsec
IPsec over GRE
IPsec

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which IPsec framework protocol provides data integrity and data authentication, but does not provide data confidentiality?

ESP
DH
SHA
AH
HMAC

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?