8.4.5 Practice Questions

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

332

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

1

Report

Uploaded by MinisterElementWolverine34

8.4.5 Practice Questions 1. Which of the following protocols provides authentication and encryption services for VPN traffic? IPsec 2. A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which of the following key steps should you take as you implement this configuration? (Select two. Each option is part of the complete solution.) Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection. 3. Which of the following VPN protocols was developed by Cisco and can be used to route any Layer 3 protocol across an IP network? GRE 4. You want to use a VPN tunneling protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? PPTP 5. Which of the following was developed by Microsoft as one of the first VPN protocols and supports only TCP/IP? PPTP 6. What is a VPN's primary purpose? Support secure communications over an untrusted network. 7. Which of the following statements about an SSL VPN are true? (Select two.) Uses UDP port 500. Uses port 443. 8. Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.) RDP PPTP Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which of the following solutions would be BEST to implement? VPN concentrator 10. While on a business trip, an employee accesses the company's internal network and transfers files using an encrypted connection. Which of the following digital security methods is the employee MOST likely using? VPN
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help