SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Protepcting Network Traffic With IPsec
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 42 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPsec by default operates in ______ mode - which is used to provide end-to-end security between computers.
quick mode
transport
Group Policy
filter lists
2. IP ______ contain a set of one or more IP filters that capture IP traffic for an IPsec Policy.
certificate
Active Directory domain
filter lists
Layer Two Tunneling Protocol (L2TP)
3. Transport mode is also used in most IPsec-based VPNs - for which the ______is used to tunnel the IPsec connection through the public network.
certificate
specific
Kerberos (Active Directory) - Certificates - Preshared key
Layer Two Tunneling Protocol (L2TP)
4. Every IPsec Policy is composed of one or more IPsec Policy ______ that determine when and how IP traffic should be protected.
rules
tunnel
Windows Firewall with Advanced Security (WFAS) - WFAS
A filter action
5. ______ by default attempt to negotiate only authentication services.
Layer Two Tunneling Protocol (L2TP)
Connection Security Rules
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Active Directory domain
6. When you assign ______ policy to a computer through a GPO - that computer will never initiate a request to establish an IPsec communications channel with another computer.
Data authentication - Encryption
Security Association (SA)
Client (Respond Only)
Authentication Header (AH) and Encapsulating Security Payload (ESP)
7. With IPsec ______ mode - an entire IP packet is protected and then encapsulated with an additional - unprotected IP header.
Data integrity
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Kerberos
tunnel
8. Each policy rule - in turn - is associated with one IP ______ and one filter action.
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
simpler to configure
IPsec Policies
filter list
9. Possible filter actions for a rule include block - permit - or ______ security.
Secure Server (Require Security)
certificate
quick mode
negotiate
10. In Win Vista - Win 7 - Win Srvr 2008 and Win Srvr 2008 R2 - IPsec is enforced either by ______ or ______.
list has only one IP filter
Client (Respond Only)
IPsec Policies or Connection Security Rules
Data authentication - Encryption
11. IPsec protects data between two IP addresses by providing the following services:
AH
ESP - AH
two-phase
Data authentication - Encryption
12. Remember that ______ authentication is preferable in an AD environment. Outside of an AD environment - a certificate infrastructure is your best option.
Kerberos
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
Anti-replay protection
Group Policy
13. You configure Connection Security Rules for any one computer in the ______ console or the ______node in Server Manager.
transport
Windows Firewall with Advanced Security (WFAS) - WFAS
Secure Server (Require Security)
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
14. You should assign the ______ policy to computers for which encryption is preferred but not required.
ignores any
Server (Request Security)
Kerberos (Active Directory) - Certificates - Preshared key
filter list
15. In Group Policy - three IPsec Policies are predefined. You can thus configure an IPsec Policy for a domain or an OU by assigning any one of the following predefined policies:
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Server (Request Security)
data authentication
list has only one IP filter
16. Note that when matching a source or destination address - the most ______ IPsec filter always takes precedence.
Group Policy
negotiate
specific
Kerberos (Active Directory) - Certificates - Preshared key
17. Like IPsec Policies - ______ evaluate network traffic and then block - allow - or negotiate security for messages based on the criteria you establish.
Data authentication - Encryption
simpler to configure
Connection Security Rules
list has only one IP filter
18. If Group Policy assigns an IPsec Policy to a computer - the computer ______ IPsec Policy assigned in its Local Security Policy.
ESP - AH
data authentication
ESP
ignores any
19. You should assign the ______ policy to intranet servers that require secure communications - such as a server that transmits highly sensitive data.
Active Directory domain
Secure Server (Require Security)
Kerberos
IPsec Policies or Connection Security Rules
20. ______ by default attempt to negotiate both authentication and encryption services.
Security Association (SA)
IPsec Policies
Kerberos (Active Directory) - Certificates - Preshared key
Connection Security Rules
21. ______ provides data origin authentication - data integrity - and anti-replay protection for the entire IP packet.
Encryption
filter lists
A filter action
AH
22. You can configure IPsec to verify that each packet received is unique and not duplicated. This describes what?
automatically becomes unassigned
Internet Key Exchange (IKE)
filter list
Anti-replay protection
23. You can use IPsec to encrypt network data so that the data is unreadable if captured in transit. This describes what?
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Server (Request Security)
Encryption
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
24. To ensure successful and secure communication - IKE performs a ______ negotiation operation - each with its own SAs.
filter list
two-phase
rules
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
25. You can assign only one IPsec Policy to a computer at a time. If you assign a second IPsec Policy to a computer - the first IPsec Policy ______.
AH
automatically becomes unassigned
Encryption
Windows Firewall with Advanced Security (WFAS) - WFAS
26. You can assign an IPsec Policy either to an individual computer by using Local Security Policy or to a group of computers by using ______.
Group Policy
list has only one IP filter
Encryption
Server (Request Security)
27. If you need encryption - use ______. If you just need to authenticate the data origin or verify data integrity - use ______.
ESP - AH
Active Directory domain
Secure Server (Require Security)
AH
28. You can use an Isolation rule to configure "domain isolation." This simply means that you can use Connection Security Rules to block traffic from computers originating from outside the local ______.
Active Directory domain
Anti-replay protection
tunnel
list has only one IP filter
29. Security for an SA is provided by the two IPsec protocols: ______ and ______.
transport
filter list
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Anti-replay protection
30. To establish SAs dynamically between IPsec peers - the ______ protocol is used.
IPsec Policies
Data authentication - Encryption
Internet Key Exchange (IKE)
rules
31. IPsec provides ______ in the form of data origin authentication - data integrity - and anti-replay protection.
ignores any
IPsec Policies or Connection Security Rules
data authentication
filter list
32. If you need to implement IPsec in a production environment in which Kerberos authentication is not available - you should use a ______ infrastructure to authenticate the IPsec peers.
Anti-replay protection
Active Directory domain
Security Association (SA)
certificate
33. You can use IPsec to ensure that data is not altered in transit. This describes what?
Data integrity
automatically becomes unassigned
specific
data authentication
34. You can configure IPsec to ensure that each packet you receive from a trusted party in fact originates from that party and is not spoofed. This describes what?
ignores any
Active Directory domain
Data origin authentication
Internet Key Exchange (IKE)
35. Determines whether the traffic captured by an IP filter in a given policy rule is permitted - blocked - encrypted - or authenticated.
A filter action
automatically becomes unassigned
Connection Security Rules
ESP - AH
36. You can use any of these three methods to authenticate the hosts communicating through IPsec:
Kerberos (Active Directory) - Certificates - Preshared key
Authentication Header (AH) and Encapsulating Security Payload (ESP)
negotiate
certificate
37. ______ provides data encryption - data origin authentication - data integrity - and anti-replay protection for the ESP payload.
list has only one IP filter
Group Policy
filter lists
ESP
38. Every IPsec Policy rule have an IP filter list even if the ________________.
list has only one IP filter
Anti-replay protection
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Data authentication - Encryption
39. After two computers negotiate an IPsec connection - whether through IPsec Policies or Connection Security Rules - the data sent between those computers is secured in what is known as a ______.
Secure Server (Require Security)
Group Policy
Security Association (SA)
tunnel
40. Phase 1 negotiation is known as main mode negotiation - and Phase 2 is known as ______ negotiation.
Data integrity
quick mode
certificate
Windows Firewall with Advanced Security (WFAS) - WFAS
41. The main advantage of using Connection Security Rules is that they are ______.
tunnel
Kerberos (Active Directory) - Certificates - Preshared key
negotiate
simpler to configure
42. You can summarize the steps for establishing an IPsec connection in the following way:
Connection Security Rules
Server (Request Security)
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
Anti-replay protection