QUIZ START
#1. Which of the following commands reveal the ACLs, transform sets and peer information and indicate which interface is being use to connect the remote IPsec VPN peer? (CISCO)
#2. Which components acts as in if-then statement, looking for packets that should be encrypted before they leave the interface?
#3. What are the two main authentication methods for authenticating a peer as the last step of IKE Phase 1?
#4. Which phase is used for private management traffic between the two VPN peers?
#5. How is the negotiation of the IPsec (IKE Phase 2) tunnel done securely?
#6. Which of the following is NOT part of the IKE Phase 1 process?
#7. What method is used to allow two VPN peers to establish shared secret keys and to establish those keys over an untrusted network?
#8. Which of the following are negotiated during IKE Phase 1
#9. What are the source and destination addresses used for any encrypted IPsec packet?
#10. Which technology is a primary method that IPsec uses to implement data integrity?
Previous
Finish