PrepAway - Latest Free Exam Questions & Answers

How does PPTP provide protection?

How does PPTP provide protection?

PrepAway - Latest Free Exam Questions & Answers

A.
Through encryption

B.
Through encapsulation

C.
Through encryption and encapsulation

D.
Through CHAP and AEP

Explanation:
Point-to-Point Tunneling Protocol (PPTP) is a Microsoft virtual
private network (VPN) protocol. It provides encapsulation, which means it
re-packages the original frame and encrypts it. This allows for secure communication
to take place via an untrusted network, such as the Internet. L2TP is a protocol
that provides just encapsulation, not encapsulation and encryption.

6 Comments on “How does PPTP provide protection?

  1. Gummbah says:

    Younes Aouad is not right. PPTP, a Microsoft protocol, allows remote users to set up a PPP connection to a local ISP and then create a secure VPN to their destination. PPTP has been the de facto industry-standard tunneling protocol for years, but the new de facto standard for VPNs is IPSec. Although tunneling does not by default mean the user’s data are encrypted (i.e. just encapsulation), in most implementations tunneling and encryption are both used. When PPTP is used, the PPP payload is encrypted with Microsoft Point-to-Point Encryption (MPPE) using MS-CHAP or EAP-TLS.




    0



    0
  2. CasiMax says:

    It is B, FYI. The CISSP exam focuses on the RFC 2637 version of PPTP, not the Microsoft implementation, which was customized using proprietary modifications to support data encryption using Microsoft Point-to-Point Encryption (MPPE)

    Thus, The initial tunnel negotiation process used by PPTP is not encrypted. It is encapsulated




    0



    0
    1. Dre says:

      That’s a good point, but I still don’t know the answer. I know that the *initial* negotiation is not encrypted, but is the communication ever encrypted *after* that? That’s the real question to answer.




      0



      0
    2. Dre says:

      That’s a good point, but I still don’t know the answer. I know that the *initial* negotiation is not encrypted, but is the communication ever encrypted *after* that? That’s the real question to answer.




      0



      0

Leave a Reply