CCNA 4 Chapter 7 v5 Exam Answers 2016
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
CCNA 4 Chapter 7 v5 Exam Answers
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
1. How is “tunneling” accomplished in a VPN?
Correct
Incorrect
-
Question 2 of 30
2. Question
2. Which two scenarios are examples of remote access VPNs? (Choose two.)
Correct
Incorrect
-
Question 3 of 30
3. Question
3.
Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?Correct
Incorrect
-
Question 4 of 30
4. Question
4. Which statement correctly describes IPsec?
Correct
Incorrect
-
Question 5 of 30
5. Question
5. What is an IPsec protocol that provides data confidentiality and authentication for IP packets?
Correct
Incorrect
-
Question 6 of 30
6. Question
6. Which three statements describe the building blocks that make up the IPsec protocol framework? (Choose three.)
Correct
Incorrect
-
Question 7 of 30
7. Question
7. What key question would help determine whether an organization should use an SSL VPN or an IPsec VPN for the remote access solution of the organization?
Correct
Incorrect
-
Question 8 of 30
8. Question
8. What is the purpose of a message hash in a VPN connection?
Correct
Incorrect
-
Question 9 of 30
9. Question
9. A network design engineer is planning the implementation of a cost-effective method to interconnect multiple networks securely over the Internet. Which type of technology is required?
Correct
Incorrect
-
Question 10 of 30
10. Question
10. What is one benefit of using VPNs for remote access?
Correct
Incorrect
-
Question 11 of 30
11. Question
11. Which statement describes a characteristic of IPsec VPNs?
Correct
Incorrect
-
Question 12 of 30
12. Question
12. What is the purpose of the generic routing encapsulation tunneling protocol?
Correct
Incorrect
-
Question 13 of 30
13. Question
13. Which algorithm is an asymmetrical key cryptosystem?
Correct
Incorrect
-
Question 14 of 30
14. Question
14. A network design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would provide the strongest level of message integrity?
Correct
Incorrect
-
Question 15 of 30
15. Question
15. What two encryption algorithms are used in IPsec VPNs? (Choose two.)
Correct
Incorrect
-
Question 16 of 30
16. Question
16. Which statement describes a feature of site-to-site VPNs?
Correct
Incorrect
-
Question 17 of 30
17. Question
17. Which Cisco VPN solution provides limited access to internal network resources by utilizing a Cisco ASA and provides browser-based access only?
Correct
Incorrect
-
Question 18 of 30
18. Question
18. Which two algorithms use Hash-based Message Authentication Code for message authentication? (Choose two.)
Correct
Incorrect
-
Question 19 of 30
19. Question
19. Which function of IPsec security services allows the receiver to verify that the data was transmitted without being changed or altered in any way?
Correct
Incorrect
-
Question 20 of 30
20. Question
20.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What problem is preventing the hosts from communicating across the VPN tunnel?
Correct
Incorrect
-
Question 21 of 30
21. Question
21. What is the purpose of utilizing Diffie-Hellman (DH) algorithms as part of the IPsec standard?
Correct
Incorrect
-
Question 22 of 30
22. Question
22.
Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)
Correct
Incorrect
-
Question 23 of 30
23. Question
23. Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?
Correct
Incorrect
-
Question 24 of 30
24. Question
24. Which remote access implementation scenario will support the use of generic routing encapsulation tunneling?
Correct
Incorrect
-
Question 25 of 30
25. Question
25. Which critical function that is provided by IPsec ensures that data has not been changed in transit between the source and destination?
Correct
Incorrect
-
Question 26 of 30
26. Question
26. Which service of IPsec verifies that secure connections are formed with the intended sources of data?
Correct
Incorrect
-
Question 27 of 30
27. Question
27. Fill in the blank.
- (GRE) is a site-to-site tunnel protocol developed by Cisco to allow multiprotocol and IP multicast traffic between two or more sites.
Correct
Incorrect
-
Question 28 of 30
28. Question
28. What is an advantage of using the Cisco Secure Mobility Clientless SSL VPN?
Correct
Incorrect
-
Question 29 of 30
29. Question
29. How can the use of VPNs in the workplace contribute to lower operating costs?
Correct
Incorrect
-
Question 30 of 30
30. Question
30. Which two characteristics describe IPsec VPNs? (Choose two.)
Correct
Incorrect
Comments