1. What is a Virtual Private Network (VPN)?
Evaluate your answer
2. What is the meaning of the "TUNNELING" process within VPNs?
Evaluate your answer
3. What do we mean by "ENCRYPTING" within VPNs?
Evaluate your answer
4. On which RM-OSI layer do we implement the IPSec security?
Evaluate your answer
5. What is the purpose of the ISAKMP protocol?
Evaluate your answer
6. What is the goal of the IKE protocol?
Evaluate your answer
7. In which protocol are the IKE protocol log messages encapsulated?
Evaluate your answer
8. How many phases does IKE have?
Evaluate your answer
9. For what purpose is the Diffie-Hellman algorithm used?
Evaluate your answer
10. What is the result of the Diffie-Hellmann algorithm?
Evaluate your answer
11. Which switch feature allows detection of ARP Cache Poisoning?
Evaluate your answer
12. How many SAs need to be built for duplex (bi-directional) VPN communication?
Evaluate your answer
13. How does the IPSec VPN connection authentication work?
Evaluate your answer
14. What kind of network attack is it, when the attacker falsifies the DHCP protocol messages in the local network (for example, by running a custom DHCP server with modified network parameters) with the goal to deceive a victim by using another default gateway?
Evaluate your answer
15. On the contrary to Dynamic ARP Inspection, the following is checked in IP Source Guard:
Evaluate your answer
16. For which type of connection, conventional SSL VPN cannot be used?
Evaluate your answer
17. What is the purpose of an electronic signature?
Evaluate your answer
18. Which type of electronic signature ensures legal acceptance of signed documents?
Evaluate your answer
19. What type of data can be signed by an electronic signature?
Evaluate your answer
20. What is the purpose of a timestamp?
Evaluate your answer