Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796

Chapter 5, Page 195 Prof. Michael P. Harris

ITSY 2430 Intrusion Detection Chapter Quiz 05
Name: ______Date: ______

Chapter Review Questions, Virtual Private Networks (VPN)

1.  A VPN is said to be virtual because the connections are ______. (Choose all that apply.)

2.  VPNs differ from leased lines in that they use which of the following to make connections?

3.  The VPN connection through which data passes from one endpoint to another is called a(n) ______.

4.  Under what circumstances does a firewall need to be installed at the endpoint of a VPN connection, and why?


5.  A VPN that uses hardware to connect two networks is called which of the following? (Choose all that apply.)

6.  What term describes a set of procedures for enabling a VPN to encrypt traffic?

7.  ______protects the integrity of data sent along the VPN tunnel; the source and destination information of the actual data packets is completely hidden.

8.  PPTP uses a proprietary technology called ______to encrypt data that passes between the remote computer and the remote access server.

9.  What type of VPN is used to provide remote users with dial-up access to a central office?

10. A group of authentication and encryption settings that two computers negotiate to set up a secure VPN connection is called?

11. Computers in a VPN authenticate one another by means of which encryption-related component?

12. What makes a VPN such a cost-effective option?

13. ______provides authentication and encryption of TCP/IP packets over a VPN or other connection, and is used primarily on UNIX-based systems.

14.  Companies that maintain VPNs with business partners often benefit by using the same ______. (Choose all that apply.)

15. IPSec provides for what security activity to take place before data is encrypted or transmitted?

16. To access an application protected by Kerberos, which of the following is required?

17. Which of the following adds encrypted authentication and support for User Datagram Protocol (UDP)?

18. Internet Key Exchange (IKE) uses which of the following to encrypt a packet’s header and data?

19. If a VPN is to be used with a firewall that performs NAT, IPSec should be configured to work in which mode?

20. To perform encryption at both endpoints of a VPN, the keys must be exchanged by participants who have a(n) ______.

Page 1 of 3