CCNA 4 v5.0 Connecting Networks Chapter 7 Exam
Quiz-summary
0 of 24 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
Information
CCNA 4 v5.0 Connecting Networks Chapter 7 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 24 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- Answered
- Review
-
Question 1 of 24
1. Question
How is “tunneling” accomplished in a VPN?
Correct
Incorrect
-
Question 2 of 24
2. Question
Which two scenarios are examples of remote access VPNs? (Choose two.)
Correct
Incorrect
-
Question 3 of 24
3. Question
Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?
Correct
Incorrect
-
Question 4 of 24
4. Question
Which statement correctly describes IPsec?
Correct
Incorrect
-
Question 5 of 24
5. Question
What is an IPsec protocol that provides data confidentiality and authentication for IP packets?
Correct
Incorrect
-
Question 6 of 24
6. Question
Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)
Correct
Incorrect
-
Question 7 of 24
7. Question
What key question would help determine whether an organization should use an SSL VPN or an IPsec VPN for the remote access solution of the organization?
Correct
Incorrect
-
Question 8 of 24
8. Question
What is the purpose of a message hash in a VPN connection?
Correct
Incorrect
-
Question 9 of 24
9. Question
A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. Which type of technology is required?
Correct
Incorrect
-
Question 10 of 24
10. Question
What is one benefit of using VPNs for remote access?
Correct
Incorrect
-
Question 11 of 24
11. Question
Which statement describes a characteristic of IPsec VPNs?
Correct
Incorrect
-
Question 12 of 24
12. Question
What is the purpose of the generic routing encapsulation tunneling protocol?
Correct
Incorrect
-
Question 13 of 24
13. Question
Which algorithm is an asymmetrical key cryptosystem?
Correct
Incorrect
-
Question 14 of 24
14. Question
A network design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would provide the strongest level of message integrity?
Correct
Incorrect
-
Question 15 of 24
15. Question
What two encryption algorithms are used in IPsec VPNs? (Choose two.)
Correct
Incorrect
-
Question 16 of 24
16. Question
Which statement describes a feature of site-to-site VPNs?
Correct
Incorrect
-
Question 17 of 24
17. Question
Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?
Correct
Incorrect
-
Question 18 of 24
18. Question
Which two algorithms use Hash-based Message Authentication Code for message authentication? (Choose two.)
Correct
Incorrect
-
Question 19 of 24
19. Question
Which function of IPsec security services allows the receiver to verify that the data was transmitted without being changed or altered in any way?
Correct
Incorrect
-
Question 20 of 24
20. Question
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is preventing the hosts from communicating across the VPN tunnel?
Correct
Incorrect
-
Question 21 of 24
21. Question
What is the purpose of utilizing Diffie-Hellman (DH) algorithms as part of the IPsec standard?
Correct
Incorrect
-
Question 22 of 24
22. Question
Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)
Correct
Incorrect
-
Question 23 of 24
23. Question
Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?
Correct
Incorrect
-
Question 24 of 24
24. Question
Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?
Correct
Incorrect