Module 8: Implementing Virtual Private Networks and Implementing the Cisco Adaptive Security Appliance Flashcards
A computer network concept that masks your IP address so your online actions are virtually untraceable.
virtual private network
It gives you online privacy and anonymity by creating a private network from a public internet connection.
virtual private network
What are the benefit of virtual private network?
- cost savings
- security
- scalability
- compatibility
What are the different types of virtual private network?
- remote-access virtual private network
- site-to-site virtual private network
A type of VPN where remote employees can log on to your office network from anywhere — home, traveling, or in transit.
remote-access virtual private network
A type of VPN where a company can securely connect its corporate network with its remote offices to communicate and share resources with them as a single network.
site-to-site virtual private network
A type of VPN that is are frequently used by companies with multiple offices in different geographic locations that need to access and use the corporate network on an ongoing basis.
site-to-site virtual private network
A type of VPN that creates a virtual tunnel between an employee’s device and the company’s network.
remote-access virtual private network
A component of remote-access VPN that requires the user to provide valid credentials to sign in to the VPN.
network access server
Components of Site-to-Site VPN
- Virtual private gateway
- Transit gateway
- Customer gateway device
- Customer gateway
What are algorithms used for confidentiality under the IPSec framework?
- data encryption standard
- triple data encryption standard
- advanced encryption standard
- software-optimized encryption algorithm
What are the algorithms used for the integrity of a network?
- message digest algorithm (MD5)
- secure hash algorithm (SHA)
What are the algorithms used for the authentication of a network?
- Pre-Shared Key (PSK)
- RSA algorithm (Rivest-Shamir-Adleman)
A group of protocols that are used together to set up encrypted connections
between devices.
IPsec (internet protocol security)
It is a group of protocols which is used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from.
IPsec (internet protocol security)
An IPSec protocol that verifies any message passed from one router to another was not modified during transit.
authentication header
An IPSec protocol where IP packet encryption conceals the data payload and the identities of the ultimate source and destination.
encapsulating security payload
A concept in computer network that refers to the accuracy and completeness of data.
integrity
It is an algorithm where it common application is to encrypt password.
Secure Hash Algorithm
It is a family of cryptographic functions designed to keep data secured.
secure hash algorithm
It is an algorithm designed to be one-way functions, meaning that once they’re transformed into their respective hash values, it’s virtually impossible to transform them back into the original data.
secure hash algorithm
a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.
message digest-5
It is a hash function that was originally designed for use as a secure cryptographic hash algorithm for authenticating digital signatures.
message digest-5
A client authentication method that uses a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters, to generate unique encryption keys for each wireless client.
Pre-Shared Key (PSK)