Week 2 Flashcards

1
Q

-to create end-to-end private networks to create end-to-end private network connections
-is virtual in that it carries information within a private network, but that information is actually transported over a public network.
-is private in that the traffic is encrypted to keep the data confidential while it is transported acrosss the public network.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(VPN Benefits)
-organizations can use VPNs to reduce their connectivity costs while simultaneously increasing remote connection bandwidth.

A

cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(VPN Benefits)
-encryption and authentication protocols data from unauthorized access.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(VPN Benefits)
-VPNs allow organizations to use the internet, making it easy to add new users wihtout adding significant infrastructure.

A

scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(VPN Benefits)
-VPNs can be implemented across a wide variety of WAN link options including broadband technologies. Remote workers can use these high-speed connections to gain secure access to corporate networks.

A

compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

-common solution for securing enterprise traffic across the internet. Site-to-seite and remote access VPNs are created and managed by the enterprise using IPsec and SSL VPNs/

A

Enterprise VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-created and managed by the provider network, The provider uses Multiprotocol Label Switching (MPLS) at Layer 2 or Layer 3 to create secure channels between an enterprise’s sites, effecticely segregating the traffic from other customer traffic.

A

Service Provider VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-does not ask you to install for connection, you can use the browser to connect

A

Client SSL Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-let remote and mobile users securely connect to the enterprise.
-are typically enabled dramatically by the user when required and can be created using either IPsec or SSL.

A

Remote-access VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(remote-access VPNs)
-the connection is secured using a web browser SSL connection

A

clientless VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(remote-access VPNs)
-VPN client software such as Cisco AnyConnect Secure Mobility Client must be installed on the remote user’s end device.

A

Client-based VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-uses the public key infrastructure and digitial certificates to authenticate peers. The type of VPN method implemented is based on the access requirements of the users and the organization’s IT processes.

A

SSL VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-connect networks across an untrusted network such as the internet.

A

site-to-site VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(site-to-site IPsec VPNs)
–send and receive normal unencrypted TCP/IP traffic through a VPN gateway.

A

end hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(site-to-site IPsec VPNs)
-encapsulates and encrypts outbound traffic from a site and sends the traffic through the VPN tunnel to the VPN gateway strips the headers, decrypts thw contect and relays the packet toward the target host inside its private network.

A

VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-is a non-secure site-to-site VPN tunneling protocol
-does not default support encryption; and therefore, it does not provide a secure VPN tunnel.
-its packet can be encapsulated into an IPsec packet to forward it securely to the destination VPN gateway.

A

Generic Routing Encapsulation (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(GRE over IPsec)
-can encapsulate various network layer protocols as well as multicast and broadcast traffic.

A

GRE tunnel

18
Q

(GRE over IPsec)
-this is the original packet that is to be encapsulated by GRE. It could be an IPv4 or IPv6 pakcet, a routing update, and more.

A

passenger protocol

19
Q

(GRE over IPsec)
-that encapsulates the original passenger packet

A

carrier protocol

20
Q

(GRE over IPsec)
-this is the protocol that will actually be used to forward the packet. This could be IPv4 or IPv6.

A

Transport protocol

21
Q

-is a Cisco software slolution for building multiple VPNs in an easy, dynamic, and scalale manner
-simplifies the VPN tunnel configuration and provides a flexible option to connect a central site with branch sites.

A

Dynamic Multipoint VPNs (DMVPN)

22
Q

(Dynamic Multipoint VPNs)
-establish secure VPN tunnels with the hub site.
-can also obtain information about each other, and alternatively build direct tunnels between themselves (spoke-to-spoke tunnels)

A

spoke sites

23
Q

-simplifies the configuration process required to support multiple sites and remote access.
-configurations are applied to a virtual interface instead of static mapping the IPsec sessions to a physical interface.
-is capable of sending and receving both IP unicast anf multicast encrypted traffic. Therefore, routing protocols are automatically supported without having to configure GRE tunnels
-can be configured between sites or in a hub-and-spoke topology.

A

IPsec Virtual Tunnel Interface (IPsec VTI)

24
Q

(service provider MPLS VPNs)
-is forwarded through the MPLS backbone using labels.
-is secure because service provider customers cannot see each other’s traffic.

A

traffic

25
Q

-can provide clients with managed VPN solutions; therefore, securing traffic between client sites in the responsibility of the service provider.
-is an open standard but cisco has its implementations

A

MPLS

26
Q

(MPSL VPN solutions)
-the service provider participates in stomer routing by establishing a peering between the customer’s routers and the provider’s routers

A

Layer 3 MPLS VPN

27
Q

(MPSL VPN solutions)
-the service provider is not involved in the customer routing. Instead, the provider deploys a Virtual Private LAN Service (VPLS) to emulate an Ethernet multiaccess LAN segment over the MPLS network. No routing is involved. The cutomer’s routers effecticely belong to the same multiaccess network.

A

layer 2 MPLS VPN

28
Q

-is an IETF standard that defines how A VPN can be secured across IP networks.
-protects and authenticates IP packets between source and destination and provides these essential security functions.
-is open-standard-you can configure it in non-cisco devices
-alone is good enough for implementation of VPN; it is a complete package.
-is not bound to any specific rules for secure cmmunications
-can easily integrate new security technologies without updating existing IPsec standards.
-encapsulates packets using Authentication Header (AH) or Encapsualtion Security Protocol (ESP).

A

IPsec

29
Q

(IPsec Technologies)
-uses encryption algorithms to prevet cybercriminals from reading the packet contents.
-the degree depends on the encryption algorithm and the length of the key used in the encryption algorithm.

A

confidentiality

30
Q

(IPsec Technologies)
-uses hashing algorithms to ensure that pakcets have not been altered between source and destination
-is computed using thr hash code
-means that the data has not changed in transit

A

Integrity

31
Q

(IPsec Technologies)
-uses the internet key exchange (IKE) protocol to authenticate source and destination.

A

origin authentication

32
Q

(IPsec Technologies)
-used to secure key exchange
-allows two peers to establish a shared secret key over an insecure channel.

A

diffie-hellman

33
Q

(IP sec Protocol Encapsulation)
-is appropriate only when confidentiality is not required or permitted

A

AH (Authentication Header)

34
Q

(IPsec Protocol Encapsulation)
-provides both confidentiality and authentication

A

ESP (Enscapsulation Security Protocol)

35
Q

(confidentiality)
-Uses a 56-bit key

A

DES

36
Q

(confidentiality)
-uses three independent 56-bit encryption keys per 64-bit block

A

3DES

37
Q

(confidentiality)
-offers three different key lengths: 128 bits, 192 bits, and 256 bots

A

AES

38
Q

(confidentiality)
-is a stream cipher, which means it encrypts data continuously rather than encrypting blocks of data.
-uses a 160-bit key.

A

SEAL

39
Q

(integrity)
-is a data integrity algorithm that guarantees the integrity of the message using a hash value.

A

Hashed Message Authentication Code (HMAC)

40
Q

(integrity)
-uses a 128-bit shared-secret key

A

Message-Digest 5 (MD5)

41
Q

(integrity)
-uses a 160-bit secret key

A

Secure Hash Algorithm (SHA)