Home Uncategorised Network Security Specialist – Virtual Private Networks (VPN) Quiz Answers

Network Security Specialist – Virtual Private Networks (VPN) Quiz Answers

0

Question: Which of the following is a weakness in PPTP?

  • Clear text passwords
  • No encryption
  • Used only with IP networks
  • Not supported on most platforms

Question: Which of the following is an important security feature in CHAP

  • It periodically re-authenticates
  • It uses 3DES encryption
  • It is immune to spoofing
  • It uses AES encryption

Question: Openswan is a VPN solution provided by CISCO.

  • True
  • False

Question: What is the purpose of IKE?

  • Key exchange
  • Packet encryption
  • Header protection
  • Authentication

Question: Which of the following is PPTP an acronym for?

  • Point-to-Point Transmission Protocol
  • Point-to-Point Tunneling Protocol
  • Point-to-Point Transmission Procedure
  • Point-to-Point Tunneling Procedure

Question: Which of the following is generally considered the least secure?

  • PAP
  • SPAP
  • MS-CHAP
  • X-PAP

Question: Which protocol is PPTP is based on?

  • SLIP
  • L2TP
  • IPSec
  • PPP

Question: The ESP Protocol provides data confidentiality and authentication.

  • True
  • False

Question: Which authentication protocols are available under PPTP?

  • MS-CHAP, PAP, SPAP
  • EAP, CHAP
  • PAP, EAM, MS-CHAP
  • SPAP, MS-CHAP

Question: What does L2TP stand for?

  • Level 2 Transfer Protocol
  • Layer 2 Tunnelling Protocol
  • Level 2 Tunnelling Protocol
  • Level 2 Transfer Protocol

LEAVE A REPLY

Please enter your comment!
Please enter your name here