Implementing Secure Solutions with Virtual Private Networks (SVPN) Quiz Questions and Answers

IN IPSEC VPN udp, 4500 port used by which of the following?

Answer :
  • ESP to encapsulate udp 4500

A network administrator is configuring AES encryption for the ISAKMP policy on an IOS router. Which two configurations are valid? (Choose two.)

Answer :
  • crypto isakmp policy 10 encryption aes 192
  •  crypto isakmp policy 10 encryption aes 256

A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?

Answer :
  • SHA2-HMAC

A custom desktop application needs to access an internal server. An administrator is tasked with configuring the company's SSL VPN gateway to allow remote users to work. Which two technologies would accommodate the company's requirement? (Choose two).

Answer :
  • AnyConnect client
  • Smart Tunnels

Which type of NHRP packet is unique to Phase 3 DMVPN topologies?

Answer :
  • redirect

Which option is one component of a Public Key Infrastructure?

Answer :
  • the Registration Authority

Which functionality is provided by L2TPv3 over FlexVPN?

Answer :
  • the extension of a Layer 2 domain across the FlexVPN

Which IPsec security protocol should be used when confidentiality is required?

Answer :
  • ESP

which of the follwign supports Hub and spoke, spoke to spoke VPNs?

Answer :
  • DMVPN

Which risks is a company vulnerable to if it does not have a well-established patching solution for endpoints?

Answer :
  • malware