1.
Which of the following is not a characteristic of a VPN?
Correct Answer
D. It does not provide any cost savings to alternate connectivity options
Explanation
A VPN is a secure network that allows users to access and transmit data over a shared infrastructure. It achieves this by using tunneling techniques, which encapsulate data packets within another protocol. One of the advantages of using a VPN is that it can provide cost savings compared to alternate connectivity options, such as leased lines or dedicated networks. Therefore, the statement "It does not provide any cost savings to alternate connectivity options" is not a characteristic of a VPN.
2.
What would be a good characterization of a VPN tunnel established between a telecommuter's PC using a VPN client software and a VPN Concentrator at the HQ location?
Correct Answer
A. Remote access VPN
Explanation
A good characterization of a VPN tunnel established between a telecommuter's PC using a VPN client software and a VPN Concentrator at the HQ location would be a remote access VPN. This type of VPN allows remote users to securely connect to a private network over the internet, providing them with access to resources and services as if they were directly connected to the network at the HQ location.
3.
Which of the following may be used as a terminating point for a site to site VPN tunnel?
Correct Answer
D. All of the above
Explanation
All of the above options, including router, firewall, and concentrator, can be used as terminating points for a site-to-site VPN tunnel. A router is commonly used to establish VPN connections between two networks, while a concentrator is a specialized device designed for managing multiple VPN connections. Therefore, any of these options can serve as a termination point for a site-to-site VPN tunnel.
4.
Which of the following is not a Layer 2 tunneling protocol?
Correct Answer
B. IPSEC
Explanation
IPSEC is not a Layer 2 tunneling protocol. It is actually a Layer 3 protocol that provides secure communication over the Internet. Layer 2 tunneling protocols, on the other hand, are used to create virtual tunnels for transmitting data between two network endpoints. PPTP, L2TP, and L2F are all examples of Layer 2 tunneling protocols that are commonly used for VPN (Virtual Private Network) connections.
5.
Which of the following security techniques provide confidentiality (data privacy) service?
Correct Answer
B. Encryption
Explanation
Encryption is a security technique that provides confidentiality or data privacy service. It involves converting plain text into cipher text using an algorithm and a key. This ensures that only authorized individuals can access and understand the information, as the cipher text is unreadable without the key. Encryption is widely used to protect sensitive data during transmission or storage, preventing unauthorized access and maintaining the confidentiality of the information.
6.
DES, 3DES, and AES are examples of encryption algorithms that use the same key for encryption and decryption. Such encryption algorithms are categorized as:
Correct Answer
B. Symmetrical encryption
Explanation
Symmetrical encryption algorithms, such as DES, 3DES, and AES, use the same key for both encryption and decryption processes. In symmetrical encryption, the sender and receiver share a common secret key, which is used to encrypt the data at the sender's end and decrypt it at the receiver's end. This type of encryption is efficient and faster compared to asymmetrical encryption, where different keys are used for encryption and decryption. Therefore, the given answer categorizing these encryption algorithms as symmetrical encryption is correct.
7.
Which of the following is not true about DES, 3DES and AES?
Correct Answer
D. AES has export restrictions associated with it
Explanation
AES does not have export restrictions associated with it. This means that AES can be freely used and distributed without any limitations or restrictions imposed by governments or regulatory bodies. DES, on the other hand, has the least cryptographic strength, meaning it is the least secure among the three encryption algorithms mentioned. 3DES is strong but has high CPU overhead, which means it requires more computational resources to perform encryption and decryption compared to AES.
8.
What do you call a cryptographic function that has the following features:
- Takes a variable-sized message as input and produces a fixed-length output
- The output will be identical for an identical input
- A one-way function that is difficult to reverse (invert)
Correct Answer
C. Hashing
Explanation
A cryptographic function that takes a variable-sized message as input and produces a fixed-length output is called hashing. The output of the hashing function will always be the same for an identical input, making it useful for verifying data integrity. Additionally, hashing is a one-way function that is difficult to reverse or invert, providing security for sensitive information.
9.
Hashing functions like MD5 and SHA are used in IPSEC to provide which of the following services:
Correct Answer
B. Data Integrity (data protected from being changed during transit)
Explanation
Hashing functions like MD5 and SHA are used in IPSEC to provide data integrity. These functions generate a unique hash value for a given set of data. This hash value acts as a digital signature for the data, ensuring that it has not been altered during transit. By comparing the received hash value with the calculated hash value, the recipient can verify the integrity of the data. Therefore, the use of hashing functions in IPSEC helps protect the data from being changed or tampered with during transmission.
10.
Which of the following processes is used in IPSEC to negotiate symmetric keys securely between endpoints over an unsecured intermediate media?
Correct Answer
A. Diffie-Hellman Key Exchange
Explanation
The correct answer is Diffie-Hellman Key Exchange. This process is used in IPSEC to negotiate symmetric keys securely between endpoints over an unsecured intermediate media. Diffie-Hellman allows two parties to establish a shared secret key over an insecure channel without actually transmitting the key. This key can then be used for symmetric encryption and decryption of IPSEC traffic.
11.
Which of the following services is not provided by an IPSEC tunnel?
Correct Answer
D. Protection from Spyware
Explanation
An IPSEC tunnel provides services such as Data Confidentiality, Origin Authentication, and Data Integrity. These services ensure that the data transmitted through the tunnel is secure, authenticated, and not tampered with. However, Protection from Spyware is not a service provided by an IPSEC tunnel. Spyware refers to malicious software that is designed to gather information without the user's knowledge or consent. While an IPSEC tunnel can provide security for data transmission, it does not specifically protect against spyware threats.
12.
Which of the following services is not provided by AH?
Correct Answer
A. Data Confidentiality (encryption)
Explanation
AH (Authentication Header) is a protocol used in IPsec (Internet Protocol security) to provide authentication and integrity of IP packets. It does not provide data confidentiality or encryption. Instead, AH focuses on verifying the authenticity of the source of the IP packet and ensuring the integrity of the data within the packet. Data confidentiality, which involves encrypting the data to protect it from unauthorized access, is typically provided by another IPsec protocol called ESP (Encapsulating Security Payload). Therefore, the correct answer is Data Confidentiality (encryption).
13.
Which protocol number is associated with ESP?
Correct Answer
C. 50
Explanation
The correct answer is 50. ESP (Encapsulating Security Payload) is a protocol used in IPsec (Internet Protocol Security) to provide confidentiality, integrity, and authentication for data packets. It operates at the network layer (Layer 3) of the OSI model. Protocol numbers are used to identify different protocols in IP networks, and the protocol number 50 is specifically associated with ESP.
14.
Which of the following is not performed during Phase 1 of ISAKMP?
Correct Answer
B. Negotiate IPSEC SAs
Explanation
During Phase 1 of ISAKMP, the following tasks are performed: negotiate ISAKMP SAs, perform peer authentication, and perform initial Diffie-Hellman Key Exchange. However, negotiating IPSEC SAs is not performed during Phase 1. IPSEC SAs are negotiated during Phase 2 of ISAKMP.
15.
The end result of Phase 1 of ISAKMP is an interim secure channel over which Phase II of ISAKMP is performed. What does Phase II do?
Correct Answer
B. Negotiate IPSEC SAs
Explanation
Phase II of ISAKMP negotiates IPSEC SAs (Security Associations). IPSEC SAs define the parameters for securing the actual data traffic between two peers. This phase establishes the necessary keys and algorithms for encryption, authentication, and integrity, allowing secure communication between the peers. Phase II builds upon the secure channel established in Phase I to enable the secure exchange of IPSEC SAs.
16.
What is the end result of Phase II of ISAKMP?
Correct Answer
A. The IPSEC tunnel is established
Explanation
Phase II of ISAKMP is responsible for establishing the IPSEC tunnel. ISAKMP (Internet Security Association and Key Management Protocol) is a protocol used for establishing security associations and exchanging keys for IPsec (Internet Protocol Security) encryption. Phase II specifically deals with negotiating the IPSEC parameters such as encryption algorithms, session keys, and security policies. Once Phase II is successfully completed, the IPSEC tunnel is established, allowing secure communication between the two endpoints.
17.
Which of the following is NOT a value add of the companion protocol ISAKMP for IPSEC?
Correct Answer
D. It reduces the overheads associated with IPSEC tunnel establishment
Explanation
The companion protocol ISAKMP for IPSEC does not reduce the overheads associated with IPSEC tunnel establishment.
18.
Where does ISAKMP reside in the TCP/IP protocol stack?
Correct Answer
B. Above UDP with port number 500
Explanation
ISAKMP (Internet Security Association and Key Management Protocol) resides above UDP with port number 500 in the TCP/IP protocol stack. ISAKMP is a key management protocol used for establishing and negotiating security associations (SA) between devices in a network. It operates at the transport layer and uses UDP as its transport protocol. By residing above UDP with port number 500, ISAKMP ensures that it can communicate securely with other devices in the network.
19.
Which of the following approaches may be used to do peer authentication during Phase 1 of ISAKMP?
Correct Answer
C. All the above
Explanation
Both pre-shared keys and digital certificates can be used for peer authentication during Phase 1 of ISAKMP. Pre-shared keys involve sharing a secret key between the peers, while digital certificates use a public key infrastructure to verify the identity of the peers. Using both approaches provides an added layer of security and flexibility in choosing the authentication method. Therefore, the correct answer is "All the above."
20.
Which of the following is a proprietary extension to IPSEC that is not defined in the RFC specifications for IPSEC?
Correct Answer
B. Per User Authentication when connecting from VPN client to VPN concentrator
Explanation
Per User Authentication when connecting from VPN client to VPN concentrator is a proprietary extension to IPSEC that is not defined in the RFC specifications for IPSEC. The RFC specifications for IPSEC do not include any specific authentication mechanism for individual users connecting from a VPN client to a VPN concentrator. Therefore, the option of per user authentication in this context would be considered a proprietary extension.
21.
Which of the following describes the capability for a VPN terminating interface to simultaneously send IPsec protected traffic and regular unprotected traffic?
Correct Answer
A. Split tunneling
Explanation
Split tunneling describes the capability for a VPN terminating interface to simultaneously send IPsec protected traffic and regular unprotected traffic. This means that the VPN can route some traffic through the encrypted tunnel while allowing other traffic to bypass the tunnel and use the regular internet connection. This can be useful in situations where certain traffic, such as accessing local resources, does not need to be encrypted and can be routed directly.