SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Protepcting Network Traffic With IPsec
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 42 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You should assign the ______ policy to intranet servers that require secure communications - such as a server that transmits highly sensitive data.
filter list
Secure Server (Require Security)
two-phase
IPsec Policies
2. You can use IPsec to ensure that data is not altered in transit. This describes what?
Secure Server (Require Security)
Data integrity
certificate
Server (Request Security)
3. If you need encryption - use ______. If you just need to authenticate the data origin or verify data integrity - use ______.
data authentication
two-phase
ESP - AH
Data integrity
4. You can assign an IPsec Policy either to an individual computer by using Local Security Policy or to a group of computers by using ______.
Active Directory domain
Layer Two Tunneling Protocol (L2TP)
negotiate
Group Policy
5. Note that when matching a source or destination address - the most ______ IPsec filter always takes precedence.
tunnel
Connection Security Rules
transport
specific
6. Possible filter actions for a rule include block - permit - or ______ security.
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
negotiate
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
Connection Security Rules
7. You configure Connection Security Rules for any one computer in the ______ console or the ______node in Server Manager.
Data integrity
Layer Two Tunneling Protocol (L2TP)
Connection Security Rules
Windows Firewall with Advanced Security (WFAS) - WFAS
8. ______ provides data encryption - data origin authentication - data integrity - and anti-replay protection for the ESP payload.
Connection Security Rules
simpler to configure
Active Directory domain
ESP
9. Every IPsec Policy rule have an IP filter list even if the ________________.
Server (Request Security)
Authentication Header (AH) and Encapsulating Security Payload (ESP)
list has only one IP filter
simpler to configure
10. Like IPsec Policies - ______ evaluate network traffic and then block - allow - or negotiate security for messages based on the criteria you establish.
simpler to configure
Server (Request Security)
two-phase
Connection Security Rules
11. ______ by default attempt to negotiate both authentication and encryption services.
IPsec Policies
AH
Active Directory domain
specific
12. Each policy rule - in turn - is associated with one IP ______ and one filter action.
rules
Layer Two Tunneling Protocol (L2TP)
filter list
ESP
13. You can use IPsec to encrypt network data so that the data is unreadable if captured in transit. This describes what?
certificate
IPsec Policies
Encryption
Client (Respond Only)
14. You can configure IPsec to verify that each packet received is unique and not duplicated. This describes what?
Kerberos (Active Directory) - Certificates - Preshared key
Anti-replay protection
Kerberos
Authentication Header (AH) and Encapsulating Security Payload (ESP)
15. To ensure successful and secure communication - IKE performs a ______ negotiation operation - each with its own SAs.
data authentication
two-phase
tunnel
list has only one IP filter
16. IPsec provides ______ in the form of data origin authentication - data integrity - and anti-replay protection.
data authentication
Kerberos
simpler to configure
A filter action
17. Phase 1 negotiation is known as main mode negotiation - and Phase 2 is known as ______ negotiation.
quick mode
AH
list has only one IP filter
Connection Security Rules
18. Transport mode is also used in most IPsec-based VPNs - for which the ______is used to tunnel the IPsec connection through the public network.
Layer Two Tunneling Protocol (L2TP)
Windows Firewall with Advanced Security (WFAS) - WFAS
Group Policy
Client (Respond Only)
19. You should assign the ______ policy to computers for which encryption is preferred but not required.
IPsec Policies
Data origin authentication
quick mode
Server (Request Security)
20. In Win Vista - Win 7 - Win Srvr 2008 and Win Srvr 2008 R2 - IPsec is enforced either by ______ or ______.
IPsec Policies or Connection Security Rules
Data integrity
quick mode
Kerberos (Active Directory) - Certificates - Preshared key
21. IPsec by default operates in ______ mode - which is used to provide end-to-end security between computers.
certificate
AH
Layer Two Tunneling Protocol (L2TP)
transport
22. You can use an Isolation rule to configure "domain isolation." This simply means that you can use Connection Security Rules to block traffic from computers originating from outside the local ______.
Active Directory domain
Encryption
Anti-replay protection
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
23. Every IPsec Policy is composed of one or more IPsec Policy ______ that determine when and how IP traffic should be protected.
Windows Firewall with Advanced Security (WFAS) - WFAS
Security Association (SA)
rules
Anti-replay protection
24. With IPsec ______ mode - an entire IP packet is protected and then encapsulated with an additional - unprotected IP header.
Client (Respond Only)
Security Association (SA)
tunnel
Kerberos
25. If you need to implement IPsec in a production environment in which Kerberos authentication is not available - you should use a ______ infrastructure to authenticate the IPsec peers.
negotiate
certificate
Layer Two Tunneling Protocol (L2TP)
automatically becomes unassigned
26. Security for an SA is provided by the two IPsec protocols: ______ and ______.
Windows Firewall with Advanced Security (WFAS) - WFAS
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Active Directory domain
tunnel
27. When you assign ______ policy to a computer through a GPO - that computer will never initiate a request to establish an IPsec communications channel with another computer.
Client (Respond Only)
filter list
AH
A filter action
28. After two computers negotiate an IPsec connection - whether through IPsec Policies or Connection Security Rules - the data sent between those computers is secured in what is known as a ______.
two-phase
Security Association (SA)
data authentication
Data authentication - Encryption
29. You can use any of these three methods to authenticate the hosts communicating through IPsec:
transport
Kerberos (Active Directory) - Certificates - Preshared key
Security Association (SA)
ESP - AH
30. To establish SAs dynamically between IPsec peers - the ______ protocol is used.
Layer Two Tunneling Protocol (L2TP)
Security Association (SA)
filter list
Internet Key Exchange (IKE)
31. IP ______ contain a set of one or more IP filters that capture IP traffic for an IPsec Policy.
Kerberos (Active Directory) - Certificates - Preshared key
quick mode
IPsec Policies
filter lists
32. The main advantage of using Connection Security Rules is that they are ______.
AH
simpler to configure
certificate
Group Policy
33. Determines whether the traffic captured by an IP filter in a given policy rule is permitted - blocked - encrypted - or authenticated.
filter lists
Client (Respond Only)
A filter action
ESP
34. IPsec protects data between two IP addresses by providing the following services:
ESP - AH
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Server (Request Security)
Data authentication - Encryption
35. In Group Policy - three IPsec Policies are predefined. You can thus configure an IPsec Policy for a domain or an OU by assigning any one of the following predefined policies:
A filter action
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
two-phase
list has only one IP filter
36. If Group Policy assigns an IPsec Policy to a computer - the computer ______ IPsec Policy assigned in its Local Security Policy.
Authentication Header (AH) and Encapsulating Security Payload (ESP)
IPsec Policies or Connection Security Rules
two-phase
ignores any
37. You can summarize the steps for establishing an IPsec connection in the following way:
negotiate
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Internet Key Exchange (IKE)
38. Remember that ______ authentication is preferable in an AD environment. Outside of an AD environment - a certificate infrastructure is your best option.
Kerberos
filter lists
data authentication
list has only one IP filter
39. ______ by default attempt to negotiate only authentication services.
rules
Connection Security Rules
Windows Firewall with Advanced Security (WFAS) - WFAS
quick mode
40. You can assign only one IPsec Policy to a computer at a time. If you assign a second IPsec Policy to a computer - the first IPsec Policy ______.
Data origin authentication
automatically becomes unassigned
data authentication
list has only one IP filter
41. ______ provides data origin authentication - data integrity - and anti-replay protection for the entire IP packet.
tunnel
AH
IPsec Policies
ignores any
42. You can configure IPsec to ensure that each packet you receive from a trusted party in fact originates from that party and is not spoofed. This describes what?
Security Association (SA)
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
certificate
Data origin authentication