Questions
Now, it's time to check your knowledge. Select the best response to the following questions and then check your answers, found in the Assessment section at the end of the book:
- _____ was the first VPN and can work with almost any operating system; however, it is not secure and should be avoided.
a. PPTP
b. L2TP
c. SSTP
d. IKE
- _____ is a technology used to securely access remote hosts. When using this type of VPN, once the client and server are connected, you will interface with the host using the CLI.
a. PPTP
b. ISAKMP
c. IKE
d. SSH
- The _____ protocol provides data confidentiality and optional authentication of data packets between hosts.
a. PPTP
b. ESP
c. AH
d. IKE
- When traveling in _____ mode, IPsec will encrypt only the data portion of each packet yet leave the header unencrypted.
a. tunnel
b. IKE
c. PFS
d. transport
- In order to protect against a malicious actor gaining access into a system and stealing a server's private key, a network administrator...