SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Protepcting Network Traffic With IPsec
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 42 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPsec provides ______ in the form of data origin authentication - data integrity - and anti-replay protection.
data authentication
A filter action
Connection Security Rules
filter list
2. You can use IPsec to encrypt network data so that the data is unreadable if captured in transit. This describes what?
Internet Key Exchange (IKE)
Encryption
certificate
transport
3. You can use any of these three methods to authenticate the hosts communicating through IPsec:
Windows Firewall with Advanced Security (WFAS) - WFAS
Kerberos (Active Directory) - Certificates - Preshared key
Internet Key Exchange (IKE)
list has only one IP filter
4. With IPsec ______ mode - an entire IP packet is protected and then encapsulated with an additional - unprotected IP header.
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Authentication Header (AH) and Encapsulating Security Payload (ESP)
tunnel
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
5. You configure Connection Security Rules for any one computer in the ______ console or the ______node in Server Manager.
quick mode
Windows Firewall with Advanced Security (WFAS) - WFAS
list has only one IP filter
ignores any
6. Transport mode is also used in most IPsec-based VPNs - for which the ______is used to tunnel the IPsec connection through the public network.
Anti-replay protection
Layer Two Tunneling Protocol (L2TP)
Kerberos
IPsec Policies or Connection Security Rules
7. If you need to implement IPsec in a production environment in which Kerberos authentication is not available - you should use a ______ infrastructure to authenticate the IPsec peers.
quick mode
rules
certificate
Connection Security Rules
8. After two computers negotiate an IPsec connection - whether through IPsec Policies or Connection Security Rules - the data sent between those computers is secured in what is known as a ______.
Data origin authentication
Security Association (SA)
IPsec Policies or Connection Security Rules
quick mode
9. To ensure successful and secure communication - IKE performs a ______ negotiation operation - each with its own SAs.
AH
two-phase
Anti-replay protection
certificate
10. IP ______ contain a set of one or more IP filters that capture IP traffic for an IPsec Policy.
Kerberos
specific
Authentication Header (AH) and Encapsulating Security Payload (ESP)
filter lists
11. You can use an Isolation rule to configure "domain isolation." This simply means that you can use Connection Security Rules to block traffic from computers originating from outside the local ______.
data authentication
Internet Key Exchange (IKE)
Active Directory domain
Data integrity
12. IPsec protects data between two IP addresses by providing the following services:
Data authentication - Encryption
automatically becomes unassigned
tunnel
Server (Request Security)
13. Like IPsec Policies - ______ evaluate network traffic and then block - allow - or negotiate security for messages based on the criteria you establish.
Group Policy
negotiate
simpler to configure
Connection Security Rules
14. You can configure IPsec to verify that each packet received is unique and not duplicated. This describes what?
simpler to configure
Data integrity
Anti-replay protection
Server (Request Security)
15. You can configure IPsec to ensure that each packet you receive from a trusted party in fact originates from that party and is not spoofed. This describes what?
Kerberos (Active Directory) - Certificates - Preshared key
negotiate
Data origin authentication
Authentication Header (AH) and Encapsulating Security Payload (ESP)
16. You should assign the ______ policy to computers for which encryption is preferred but not required.
automatically becomes unassigned
Server (Request Security)
quick mode
IPsec Policies or Connection Security Rules
17. If you need encryption - use ______. If you just need to authenticate the data origin or verify data integrity - use ______.
IPsec Policies
ESP - AH
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Connection Security Rules
18. You can use IPsec to ensure that data is not altered in transit. This describes what?
Data authentication - Encryption
A filter action
Data integrity
Encryption
19. ______ by default attempt to negotiate both authentication and encryption services.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
certificate
AH
IPsec Policies
20. Security for an SA is provided by the two IPsec protocols: ______ and ______.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
simpler to configure
Group Policy
21. Remember that ______ authentication is preferable in an AD environment. Outside of an AD environment - a certificate infrastructure is your best option.
Kerberos
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Data integrity
tunnel
22. Phase 1 negotiation is known as main mode negotiation - and Phase 2 is known as ______ negotiation.
data authentication
quick mode
automatically becomes unassigned
Connection Security Rules
23. IPsec by default operates in ______ mode - which is used to provide end-to-end security between computers.
Active Directory domain
specific
transport
Connection Security Rules
24. To establish SAs dynamically between IPsec peers - the ______ protocol is used.
Internet Key Exchange (IKE)
certificate
list has only one IP filter
IPsec Policies or Connection Security Rules
25. In Win Vista - Win 7 - Win Srvr 2008 and Win Srvr 2008 R2 - IPsec is enforced either by ______ or ______.
AH
IPsec Policies or Connection Security Rules
negotiate
ignores any
26. ______ provides data encryption - data origin authentication - data integrity - and anti-replay protection for the ESP payload.
IPsec Policies
ESP
Client (Respond Only)
AH
27. You can assign only one IPsec Policy to a computer at a time. If you assign a second IPsec Policy to a computer - the first IPsec Policy ______.
automatically becomes unassigned
Anti-replay protection
ESP - AH
filter list
28. ______ by default attempt to negotiate only authentication services.
Connection Security Rules
Data integrity
negotiate
ignores any
29. Each policy rule - in turn - is associated with one IP ______ and one filter action.
Data authentication - Encryption
quick mode
simpler to configure
filter list
30. Possible filter actions for a rule include block - permit - or ______ security.
Group Policy
automatically becomes unassigned
Anti-replay protection
negotiate
31. You can assign an IPsec Policy either to an individual computer by using Local Security Policy or to a group of computers by using ______.
ignores any
Group Policy
Internet Key Exchange (IKE)
Data authentication - Encryption
32. You should assign the ______ policy to intranet servers that require secure communications - such as a server that transmits highly sensitive data.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Client (Respond Only)
ESP
Secure Server (Require Security)
33. Every IPsec Policy is composed of one or more IPsec Policy ______ that determine when and how IP traffic should be protected.
rules
Data integrity
two-phase
Data authentication - Encryption
34. ______ provides data origin authentication - data integrity - and anti-replay protection for the entire IP packet.
Group Policy
Encryption
AH
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
35. The main advantage of using Connection Security Rules is that they are ______.
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
Connection Security Rules
simpler to configure
Kerberos (Active Directory) - Certificates - Preshared key
36. You can summarize the steps for establishing an IPsec connection in the following way:
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
filter lists
list has only one IP filter
Internet Key Exchange (IKE)
37. If Group Policy assigns an IPsec Policy to a computer - the computer ______ IPsec Policy assigned in its Local Security Policy.
Data authentication - Encryption
Windows Firewall with Advanced Security (WFAS) - WFAS
Connection Security Rules
ignores any
38. Determines whether the traffic captured by an IP filter in a given policy rule is permitted - blocked - encrypted - or authenticated.
A filter action
Layer Two Tunneling Protocol (L2TP)
ESP - AH
Anti-replay protection
39. Note that when matching a source or destination address - the most ______ IPsec filter always takes precedence.
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
specific
two-phase
ignores any
40. In Group Policy - three IPsec Policies are predefined. You can thus configure an IPsec Policy for a domain or an OU by assigning any one of the following predefined policies:
simpler to configure
transport
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
quick mode
41. When you assign ______ policy to a computer through a GPO - that computer will never initiate a request to establish an IPsec communications channel with another computer.
two-phase
Client (Respond Only)
tunnel
IPsec Policies or Connection Security Rules
42. Every IPsec Policy rule have an IP filter list even if the ________________.
Data origin authentication
list has only one IP filter
ESP - AH
Data authentication - Encryption