Cisco Security Chapter 8

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

during both Phase 1 and 2

When is a security association (SA) created if an IPsec VPN tunnel is used to connect between two sites?

2
New cards

when a PC with Cisco IP Communicator installed connects to a Cisco switch

In which situation would the Cisco Discovery Protocol be disabled?

3
New cards

- IPsec is a framework of open standards that relies on existing algorithms

- IPsec works at the network layer and operates over all Layer 2 protocols

Which two statements accurately describe characteristics of IPsec? (Choose two)

4
New cards

negotiation of IPsec policy

Which action do IPsec peers take during the IKE Phase 2 exchange?

5
New cards

encryption

Which technique is necessary to ensure a private transfer of data using a VPN?

6
New cards

VPNs use virtual connections to create a private network through a public network

Which statement describes a VPN?

7
New cards

crypto ipsec transform-set ESP-DES-SHA esp-aes-256 esp-sha-hmac

Which transform set provides the best protection?

8
New cards

- 50

- 500

- 51

Which three ports must be open to verify that an IPsec VPN tunnel is operating properly? (Choose three)

9
New cards

It will be sent unencrypted

Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?

<p>Refer to the exhibit. How will traffic that does not match that defined by access list 101 be treated by the router?</p>
10
New cards

- AH

- ISAKMP

- ESP

What three protocols must be permitted through the company firewall for establishment of IPsec site-to-site VPNs? (Choose three)

11
New cards

The longer the key, the more key possibilities exist

Which statement describes the effect of key length in deterring an attacker from hacking through an encryption key?

12
New cards

When multiple combinations of IPsec protection are being chosen, multiple crypto ACLs can define different traffic types

What is the purpose of configuring multiple crypto ACLs when building a VPN connection between remote sites?

13
New cards

to define the encryption and integrity algorithms that are used to build the IPsec tunnel

Consider the following configuration on a Cisco ASA:crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmacWhat is the purpose of this command?

14
New cards

IPsec

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

15
New cards

- AH provides integrity and authentication

- ESP provides encryption, authentication, and integrity

- AH uses IP protocol 51

Which three statements describe the IPsec protocol framework? (Choose three.)

16
New cards

IPsec is a framework of open standards that relies on existing algorithms

Which statement accurately describes a characteristic of IPsec?

17
New cards

- SHA

- MD5

Which two IPsec protocols are used to provide data integrity? (choose two)

18
New cards

allows peers to exchange shared keys

What is the function of the Diffie-Hellman algorithm within the IPsec framework?

19
New cards

SHA

Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

<p>Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?</p>
20
New cards

access list

What is needed to define interesting traffic in the creation of an IPsec tunnel?

21
New cards

AES

Refer to the exhibit. What algorithm will be used for providing confidentiality?

<p>Refer to the exhibit. What algorithm will be used for providing confidentiality?</p>
22
New cards

- 51

- 50

Which two protocols must be allowed for an IPsec VPN tunnel is operate properly? (Choose two)

23
New cards

permits VPN to work when NAT is being used on one or both ends of the VPN

What is the purpose of NAT-T?

24
New cards

hairpinning

Which term describes a situation where VPN traffic that is is received by an interface is routed back out that same interface?

25
New cards

The VPN connection is initiated by the remote user

What is an important characteristic of remote-access VPNs?

26
New cards

GETVPN

Which type of site-to-site VPN uses trusted group members to eliminate point-to-point IPsec tunnels between the members of a group?

27
New cards

R1(config)# crypto isakmp key cisco123 address 209.165.200.227

R2(config)# crypto isakmp key cisco123 address 209.165.200.226

Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?

<p>Refer to the exhibit. Which pair of crypto isakmp key commands would correctly configure PSK on the two routers?</p>