SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Protepcting Network Traffic With IPsec
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 42 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You should assign the ______ policy to computers for which encryption is preferred but not required.
specific
Group Policy
Anti-replay protection
Server (Request Security)
2. You can assign an IPsec Policy either to an individual computer by using Local Security Policy or to a group of computers by using ______.
Group Policy
IPsec Policies or Connection Security Rules
Internet Key Exchange (IKE)
Kerberos (Active Directory) - Certificates - Preshared key
3. In Group Policy - three IPsec Policies are predefined. You can thus configure an IPsec Policy for a domain or an OU by assigning any one of the following predefined policies:
Windows Firewall with Advanced Security (WFAS) - WFAS
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Data integrity
Internet Key Exchange (IKE)
4. You can configure IPsec to ensure that each packet you receive from a trusted party in fact originates from that party and is not spoofed. This describes what?
Active Directory domain
IPsec Policies or Connection Security Rules
Data origin authentication
Group Policy
5. The main advantage of using Connection Security Rules is that they are ______.
simpler to configure
Encryption
ESP - AH
Data authentication - Encryption
6. Every IPsec Policy is composed of one or more IPsec Policy ______ that determine when and how IP traffic should be protected.
filter lists
Anti-replay protection
rules
Authentication Header (AH) and Encapsulating Security Payload (ESP)
7. You can use any of these three methods to authenticate the hosts communicating through IPsec:
Kerberos (Active Directory) - Certificates - Preshared key
specific
list has only one IP filter
filter list
8. If you need encryption - use ______. If you just need to authenticate the data origin or verify data integrity - use ______.
Encryption
Kerberos
ESP - AH
Internet Key Exchange (IKE)
9. Phase 1 negotiation is known as main mode negotiation - and Phase 2 is known as ______ negotiation.
Client (Respond Only)
Group Policy
A filter action
quick mode
10. You can summarize the steps for establishing an IPsec connection in the following way:
data authentication
IPsec Policies
tunnel
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
11. IPsec provides ______ in the form of data origin authentication - data integrity - and anti-replay protection.
specific
Data authentication - Encryption
data authentication
Layer Two Tunneling Protocol (L2TP)
12. Every IPsec Policy rule have an IP filter list even if the ________________.
filter lists
list has only one IP filter
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Layer Two Tunneling Protocol (L2TP)
13. To ensure successful and secure communication - IKE performs a ______ negotiation operation - each with its own SAs.
simpler to configure
Kerberos
Data origin authentication
two-phase
14. IP ______ contain a set of one or more IP filters that capture IP traffic for an IPsec Policy.
filter lists
tunnel
automatically becomes unassigned
Security Association (SA)
15. After two computers negotiate an IPsec connection - whether through IPsec Policies or Connection Security Rules - the data sent between those computers is secured in what is known as a ______.
Data integrity
IPsec Policies
Security Association (SA)
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
16. ______ by default attempt to negotiate only authentication services.
AH
simpler to configure
Connection Security Rules
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
17. ______ provides data origin authentication - data integrity - and anti-replay protection for the entire IP packet.
automatically becomes unassigned
Group Policy
AH
data authentication
18. When you assign ______ policy to a computer through a GPO - that computer will never initiate a request to establish an IPsec communications channel with another computer.
Client (Respond Only)
automatically becomes unassigned
Secure Server (Require Security)
Connection Security Rules
19. Security for an SA is provided by the two IPsec protocols: ______ and ______.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
filter list
AH
Security Association (SA)
20. IPsec by default operates in ______ mode - which is used to provide end-to-end security between computers.
Secure Server (Require Security)
ignores any
ESP - AH
transport
21. Each policy rule - in turn - is associated with one IP ______ and one filter action.
tunnel
simpler to configure
transport
filter list
22. Determines whether the traffic captured by an IP filter in a given policy rule is permitted - blocked - encrypted - or authenticated.
ignores any
A filter action
Group Policy
Kerberos
23. You can use IPsec to encrypt network data so that the data is unreadable if captured in transit. This describes what?
ignores any
Connection Security Rules
filter lists
Encryption
24. You can use IPsec to ensure that data is not altered in transit. This describes what?
Encryption
Data integrity
filter list
Layer Two Tunneling Protocol (L2TP)
25. ______ by default attempt to negotiate both authentication and encryption services.
data authentication
AH
rules
IPsec Policies
26. Possible filter actions for a rule include block - permit - or ______ security.
Security Association (SA)
negotiate
two-phase
Server (Request Security)
27. You can configure IPsec to verify that each packet received is unique and not duplicated. This describes what?
Client (Respond Only)
filter lists
automatically becomes unassigned
Anti-replay protection
28. ______ provides data encryption - data origin authentication - data integrity - and anti-replay protection for the ESP payload.
filter list
negotiate
two-phase
ESP
29. IPsec protects data between two IP addresses by providing the following services:
ignores any
Data authentication - Encryption
quick mode
A filter action
30. You configure Connection Security Rules for any one computer in the ______ console or the ______node in Server Manager.
AH
Windows Firewall with Advanced Security (WFAS) - WFAS
Security Association (SA)
data authentication
31. To establish SAs dynamically between IPsec peers - the ______ protocol is used.
Connection Security Rules
Data integrity
Internet Key Exchange (IKE)
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
32. You should assign the ______ policy to intranet servers that require secure communications - such as a server that transmits highly sensitive data.
Windows Firewall with Advanced Security (WFAS) - WFAS
Data integrity
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Secure Server (Require Security)
33. You can assign only one IPsec Policy to a computer at a time. If you assign a second IPsec Policy to a computer - the first IPsec Policy ______.
automatically becomes unassigned
rules
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Server (Request Security)
34. In Win Vista - Win 7 - Win Srvr 2008 and Win Srvr 2008 R2 - IPsec is enforced either by ______ or ______.
IPsec Policies or Connection Security Rules
Kerberos
list has only one IP filter
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
35. If Group Policy assigns an IPsec Policy to a computer - the computer ______ IPsec Policy assigned in its Local Security Policy.
Layer Two Tunneling Protocol (L2TP)
Kerberos (Active Directory) - Certificates - Preshared key
ignores any
specific
36. If you need to implement IPsec in a production environment in which Kerberos authentication is not available - you should use a ______ infrastructure to authenticate the IPsec peers.
negotiate
IPsec Policies
IPsec Policies or Connection Security Rules
certificate
37. Note that when matching a source or destination address - the most ______ IPsec filter always takes precedence.
ignores any
Windows Firewall with Advanced Security (WFAS) - WFAS
transport
specific
38. You can use an Isolation rule to configure "domain isolation." This simply means that you can use Connection Security Rules to block traffic from computers originating from outside the local ______.
quick mode
ESP - AH
Active Directory domain
rules
39. Transport mode is also used in most IPsec-based VPNs - for which the ______is used to tunnel the IPsec connection through the public network.
Layer Two Tunneling Protocol (L2TP)
Anti-replay protection
Secure Server (Require Security)
transport
40. Remember that ______ authentication is preferable in an AD environment. Outside of an AD environment - a certificate infrastructure is your best option.
AH
list has only one IP filter
Kerberos
Connection Security Rules
41. Like IPsec Policies - ______ evaluate network traffic and then block - allow - or negotiate security for messages based on the criteria you establish.
Connection Security Rules
Group Policy
negotiate
Security Association (SA)
42. With IPsec ______ mode - an entire IP packet is protected and then encapsulated with an additional - unprotected IP header.
tunnel
filter lists
Active Directory domain
specific