IS3220 CHAPTER 14 Flashcards Preview

IS3220 NETWORK SECURITY, FIREWALLS, & VPNS > IS3220 CHAPTER 14 > Flashcards

Flashcards in IS3220 CHAPTER 14 Deck (22):
1

This VPN is known as a VPN appliance and is VPN based. This is called ___?

CUSTOMER PREMISE EQUIPMENT (CPE)

2

This VPN model is used to connect to offices together such as a main office and a remote office and is called ___?

GATEWAY-TO-GATEWAY VPN

3

This is VPN model where the remote client connects to the VPN server to gain access to the internal network and is called ___?

HOST-TO-GATEWAY VPN

4

This is an IPSec based VPN protocol that uses NAT-Traveral (NAT-T) which allows IPSec traffic to pass through a NAT server. It provides significant improvements over previous exchange and has been adopted by several companies such as Microsoft, in Windows Server 2008 R2; Cisco, and OpenSwan. This exchange is called ___?

INTERNET KEY EXCHANGE v2 (IKEv2)

5

1. ___ provide(s) secure communications external users and internal servers located behind a firewall. (Multiple answers may be correct)

1. VPNs
2. IPSec
3. Intranets
4. Extranets
5. SSL

VPNs

Extranets

6

2. A desirable feature of an operating system-based VPN is the ability to refer to remote servers by their network address translated IP addresses.
TRUE OR FALSE

FALSE

7

3. A VPN is also know as:

1. A Neural Network
2. A data-encrypted turned over the Internet
3. A file sharing and printing server
4. A bastion host
5. None of the above

A data-encrypted turned over the Internet

8

4. Encrypted communications using Web browsers usually use the ___ protocol.

SECURE SOCKET LAYER (SSL)

9

5. An easy and cost-effective way to secure access to a network is by purchasing (an) inexpensive ___.

1. Switch
2. Router
3. Antivirus software
4. Remote terminal
5. VPN appliance

VPN appliance

10

6. Most VPN appliances are designed for complex installations.
TRUE OR FALSE

FALSE

11

7. VPN appliances are ___.

1. Not readily available
2. OS specific
3. Very expensive
4. Secure technologies
5. 1 & 2

Secure technologies

12

8. What does RDP stand for?

1. Remote Desktop Processing
2. Remote Desktop Protocol
3. Radio Demilitarized Processing
4. Recovery Dispatching Process
5. Remote Dial-up Process

Remote Desktop Protocol

13

9. Another name for Terminal Services is:

1. Remote Dial-up System
2. Remote Desktop Services
3. Remote Desktop System
4. Remote Dial-up process

Remote Desktop Services

14

10. GoToMyPC is a remote desktop technology that allows you to remotely access your computer from any other Internet-Connected computer in the world with almost any operating system through a secure, private connection.
TRUE OR FALSE

TRUE

15

11. What are two primary methods for deploying remote-access VPNs?

1. SSL and SSH
2. SSL and API
3. IPSec and SSL
4. IPSec and SSH
5. None of the above

IPSec and SSL

16

12. Terminal Services provides the ability to:

1. Host multiple, simultaneous client sessions
2. Implement software bugs
3. Implement dynamic addressing
4. Sync proxy servers
5. All the above

Host multiple, simultaneous client sessions

17

13. Terminal Services RemoteApp applications appear to users as if the applications are installed locally when they are actually running a remote server.
TRUE OR FALSE

TRUE

18

14. Microsoft's Direct Access:

1. Is an alternative to a traditional VPN
2. Is not a VPN
3. Is a mix of Microsoft Access database served through a VPN
4. Is a DDNS
5. Intrusion Detection System

Is an alternative to a traditional VPN

19

15. Users must have physical connectivity with the internal network for the DirectAccess connection to be established.
TRUE OR FALSE

FALSE

20

16. When performing a download and install of the RPM version of Openswan, you do not need to have the IPSec-tools RPM package installed on your machine.
TRUE OR FALSE

FALSE

21

17. What are the two methods of installing Openswan?

1. KLIPS and IPSec
2. RPM and source libgmp development libraries
3. By hand or automatically
4. Remotely and through a diskette
5. None of the above

RPM and source libgmp development libraries

22

18. To check that you have a successfully installed Openswan VPN you should run the command:
ipsec verify

TRUE OR FALSE

FALSE