Section 6.9

You have a group of salesmen who would like to access your private network through the
Internet while they are traveling. You want to control access to the private network through a
single server.
Which solution should you implement?
VPN concentrator
A VPN is used primarily for what purpose?
Support secured communications over an untrusted network
Which VPN protocol typically employs IPSec as its data encryption mechanism?
Which statement best describes IPSec when used in tunnel mode?
The entire data packet, including headers, is encapsulated
Which IPSec subprotocol provides data encryption?
Which of the following is not a VPN tunnel protocol?
Which is the best countermeasure for someone attempting to view your network traffic?
PPTP (Point to Point Tunneling Protocol) is quickly becoming obsolete because of what VPN
L2TP (Layer 2 Tunneling Protocol)
What is the primary use of tunneling?
Supporting private traffic through a public communication medium
In addition to Authentication Header (AH), IPSec is comprised of what other service?
Encapsulating Security Payload (ESP)
A salesperson in your organization spends most of her time traveling between customer sites.
After a customer visit, she must complete various managerial tasks, such as updating your
organization’s order database.
Because she rarely comes back to your home office, she usually accesses the network from her
notebook computer using WiFi access provided by hotels, restaurants, and airports.
Many of these locations provide unencrypted public WiFi access, and you are concerned that
sensitive data could be exposed. To remedy this situation, you decide to configure her notebook
to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select two.)
Configure the VPN connection to use IPsec
& Configure the browser to send HTTPS requests through the VPN connection.