what transport and tunnel modes protect using IPSec?
You are designing a new IPSec implementation for your organization, and are trying to determine
your security needs. You need to clearly understand the implementation choices, before you make
any changes to the network. Which of the following describes what transport and tunnel modes
protect using IPSec?
which implementation would meet your needs?
If you wish to implement IPSec between two branch offices of your organization, and wish for this
to include the encryption of the full packet, which implementation would meet your needs?
What are the three default IPSec policies in Windows Server 2003?
In your current organization, you have been given the task of implementing the IPSec solution. All
your servers are running Windows Server 2003, so you wish to use the built in policies. What are
the three default IPSec policies in Windows Server 2003?
What is the internetwork environment that connects the VPN Client to the VPN Server called?
You have clients that are connected to your network via a VPN. What is the internetwork
environment that connects the VPN Client to the VPN Server called?
which layer of the OSI model?
To verify that your PPTP implementation is working as you intended, you sniff the network after
the implementation has been completed. You are looking for specific values in the captures that
will indicate to you the type of packets received. You analyze the packets, including headers and
payload. PPTP works at which layer of the OSI model?
Which port, from the following list, will you have to allow through the firewall?
You are the firewall administrator for your company and you have just learned that the Server
administrators are gearing up support an L2TP based VPN solution. You are told to be sure that
your firewall rule sets will not hinder the performance of the VPN. Which port, from the following
list, will you have to allow through the firewall?
Which of the following provides confidentiality and authentication when implementing IPSec?
After you implemented your IPSec solution, you wish to run some tests to verify functionality.
Which of the following provides confidentiality and authentication when implementing IPSec?
which the two hosts communicate?
Your network is going to implement a new IPSec solution. Which of the following IPSec
components is used to define the security environment in which the two hosts communicate?
you need to allow through the firewall to allow these VPN sessions into your network?
You are the firewall administrator at your company and the network administrators have decided to
implement a PPTP VPN solution, which of these ports would you need to allow through the firewall
to allow these VPN sessions into your network?
Which of the following authentication protocols are used in VPNs?
In your network, at the last meeting, it was decided to modify the current client access to allow for
VPNs.
Which of the following authentication protocols are used in VPNs?