Question 1: Which of the following is a weakness in PPTP?
- Clear text passwords
- No encryption
- Used only with IP networks
- Not supported on most platforms
Question 2: Which of the following is an important security feature in CHAP
- It periodically re-authenticates
- It uses 3DES encryption
- It is immune to spoofing
- It uses AES encryption
Question 3: Openswan is a VPN solution provided by CISCO.
- True
- False
Question 4: What is the purpose of IKE?
- Key exchange
- Packet encryption
- Header protection
- Authentication
Question 5: Which of the following is PPTP an acronym for?
- Point-to-Point Transmission Protocol
- Point-to-Point Tunneling Protocol
- Point-to-Point Transmission Procedure
- Point-to-Point Tunneling Procedure
Question 6: Which of the following is generally considered the least secure?
- PAP
- SPAP
- MS-CHAP
- X-PAP
Question 7: Which protocol is PPTP is based on?
- SLIP
- L2TP
- IPSec
- PPP
Question 8: The ESP Protocol provides data confidentiality and authentication.
- True
- False
Question 9: Which authentication protocols are available under PPTP?
- MS-CHAP, PAP, SPAP
- EAP, CHAP
- PAP, EAM, MS-CHAP
- SPAP, MS-CHAP
Question 10: What does L2TP stand for?
- Level 2 Transfer Protocol
- Layer 2 Tunnelling Protocol
- Level 2 Tunnelling Protocol
- Level 2 Transfer Protocol