SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS: Protepcting Network Traffic With IPsec
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 42 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You can configure IPsec to ensure that each packet you receive from a trusted party in fact originates from that party and is not spoofed. This describes what?
filter list
data authentication
Data origin authentication
transport
2. ______ by default attempt to negotiate both authentication and encryption services.
IPsec Policies
quick mode
ESP - AH
Anti-replay protection
3. After two computers negotiate an IPsec connection - whether through IPsec Policies or Connection Security Rules - the data sent between those computers is secured in what is known as a ______.
Security Association (SA)
transport
Active Directory domain
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
4. Phase 1 negotiation is known as main mode negotiation - and Phase 2 is known as ______ negotiation.
Connection Security Rules
Active Directory domain
quick mode
simpler to configure
5. Like IPsec Policies - ______ evaluate network traffic and then block - allow - or negotiate security for messages based on the criteria you establish.
ESP - AH
Kerberos (Active Directory) - Certificates - Preshared key
Server (Request Security)
Connection Security Rules
6. ______ by default attempt to negotiate only authentication services.
Anti-replay protection
IPsec Policies
specific
Connection Security Rules
7. If Group Policy assigns an IPsec Policy to a computer - the computer ______ IPsec Policy assigned in its Local Security Policy.
Data origin authentication
Windows Firewall with Advanced Security (WFAS) - WFAS
filter list
ignores any
8. You can use IPsec to ensure that data is not altered in transit. This describes what?
specific
Data integrity
two-phase
ESP - AH
9. To ensure successful and secure communication - IKE performs a ______ negotiation operation - each with its own SAs.
Layer Two Tunneling Protocol (L2TP)
two-phase
Kerberos
Internet Key Exchange (IKE)
10. In Group Policy - three IPsec Policies are predefined. You can thus configure an IPsec Policy for a domain or an OU by assigning any one of the following predefined policies:
Server (Request Security)
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
two-phase
Group Policy
11. You should assign the ______ policy to intranet servers that require secure communications - such as a server that transmits highly sensitive data.
Data origin authentication
Active Directory domain
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Secure Server (Require Security)
12. IPsec by default operates in ______ mode - which is used to provide end-to-end security between computers.
transport
automatically becomes unassigned
AH
IPsec Policies
13. IP ______ contain a set of one or more IP filters that capture IP traffic for an IPsec Policy.
list has only one IP filter
filter lists
filter list
Connection Security Rules
14. You configure Connection Security Rules for any one computer in the ______ console or the ______node in Server Manager.
tunnel
Windows Firewall with Advanced Security (WFAS) - WFAS
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Active Directory domain
15. Transport mode is also used in most IPsec-based VPNs - for which the ______is used to tunnel the IPsec connection through the public network.
transport
rules
Security Association (SA)
Layer Two Tunneling Protocol (L2TP)
16. ______ provides data encryption - data origin authentication - data integrity - and anti-replay protection for the ESP payload.
two-phase
tunnel
ignores any
ESP
17. You can assign an IPsec Policy either to an individual computer by using Local Security Policy or to a group of computers by using ______.
Client (Respond Only)
Group Policy
tunnel
ignores any
18. You can use an Isolation rule to configure "domain isolation." This simply means that you can use Connection Security Rules to block traffic from computers originating from outside the local ______.
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
Windows Firewall with Advanced Security (WFAS) - WFAS
Active Directory domain
rules
19. If you need to implement IPsec in a production environment in which Kerberos authentication is not available - you should use a ______ infrastructure to authenticate the IPsec peers.
Encryption
ESP
Kerberos
certificate
20. Every IPsec Policy is composed of one or more IPsec Policy ______ that determine when and how IP traffic should be protected.
Anti-replay protection
rules
Data integrity
negotiate
21. When you assign ______ policy to a computer through a GPO - that computer will never initiate a request to establish an IPsec communications channel with another computer.
negotiate
Anti-replay protection
filter lists
Client (Respond Only)
22. Every IPsec Policy rule have an IP filter list even if the ________________.
A filter action
AH
Group Policy
list has only one IP filter
23. Remember that ______ authentication is preferable in an AD environment. Outside of an AD environment - a certificate infrastructure is your best option.
Internet Key Exchange (IKE)
rules
tunnel
Kerberos
24. You can use any of these three methods to authenticate the hosts communicating through IPsec:
filter lists
Data authentication - Encryption
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Kerberos (Active Directory) - Certificates - Preshared key
25. Note that when matching a source or destination address - the most ______ IPsec filter always takes precedence.
AH
Active Directory domain
specific
Data authentication - Encryption
26. You can use IPsec to encrypt network data so that the data is unreadable if captured in transit. This describes what?
rules
Encryption
Connection Security Rules
AH
27. Security for an SA is provided by the two IPsec protocols: ______ and ______.
Server (Request Security)
Data origin authentication
certificate
Authentication Header (AH) and Encapsulating Security Payload (ESP)
28. You can configure IPsec to verify that each packet received is unique and not duplicated. This describes what?
Anti-replay protection
two-phase
Group Policy
Authentication Header (AH) and Encapsulating Security Payload (ESP)
29. ______ provides data origin authentication - data integrity - and anti-replay protection for the entire IP packet.
AH
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
rules
Active Directory domain
30. With IPsec ______ mode - an entire IP packet is protected and then encapsulated with an additional - unprotected IP header.
tunnel
Encryption
Secure Server (Require Security)
Data origin authentication
31. IPsec provides ______ in the form of data origin authentication - data integrity - and anti-replay protection.
certificate
Layer Two Tunneling Protocol (L2TP)
data authentication
two-phase
32. The main advantage of using Connection Security Rules is that they are ______.
transport
Connection Security Rules
simpler to configure
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
33. You should assign the ______ policy to computers for which encryption is preferred but not required.
Kerberos (Active Directory) - Certificates - Preshared key
simpler to configure
Server (Request Security)
Data integrity
34. In Win Vista - Win 7 - Win Srvr 2008 and Win Srvr 2008 R2 - IPsec is enforced either by ______ or ______.
Kerberos (Active Directory) - Certificates - Preshared key
IPsec Policies or Connection Security Rules
automatically becomes unassigned
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
35. You can assign only one IPsec Policy to a computer at a time. If you assign a second IPsec Policy to a computer - the first IPsec Policy ______.
Data origin authentication
two-phase
automatically becomes unassigned
Connection Security Rules
36. If you need encryption - use ______. If you just need to authenticate the data origin or verify data integrity - use ______.
ESP - AH
Group Policy
Client (Respond Only) - Server (Request Security) - Secure Server (Require Security)
two-phase
37. IPsec protects data between two IP addresses by providing the following services:
Anti-replay protection
Connection Security Rules
Data authentication - Encryption
Internet Key Exchange (IKE)
38. Possible filter actions for a rule include block - permit - or ______ security.
negotiate
certificate
ESP
filter list
39. Each policy rule - in turn - is associated with one IP ______ and one filter action.
certificate
negotiate
Connection Security Rules
filter list
40. You can summarize the steps for establishing an IPsec connection in the following way:
ESP - AH
IPsec Policies or Connection Security Rules
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.
data authentication
41. Determines whether the traffic captured by an IP filter in a given policy rule is permitted - blocked - encrypted - or authenticated.
IPsec Policies
data authentication
A filter action
ESP - AH
42. To establish SAs dynamically between IPsec peers - the ______ protocol is used.
Client (Respond Only)
list has only one IP filter
Internet Key Exchange (IKE)
1. Set up a main mode SA. 2. Agree upon the terms of communication and encryption algorithm. 3. Create a quick mode SA. 4. Send data.