Front | Back |
What are 3 vital functions of VPNs?
|
Data origin authentication, Encryption, Data Integrity
|
Name 3 protocols used to create tunnels.
|
Generic Routing Encapsulation (GRE) (RFC1701), Layer 2 Tunneling Protocol (L2TP)(RFC2661), IP Security (IPSec)
|
Name a major drawback of both GRE & L2TP.
|
No encryption
|
Name a major drawback of IPSec.
|
IPSec only supports unicast IP traffic.
|
Name 2 types of remote access VPNs.
|
Client initiated (Remote access), Network Access Server initiated (site-to-site).
|
What is the difference between client-initiated and NAS-initiated VPNs?
|
Client-initiated uses a client application to create the tunnel, NAS-initiated is where the user dials into a NAS device that creates the tunnel.
|
What is anti-replay protection?
|
Protects against replay attacks, malicious repeat, or delay of valid transmission attacks by using one-time tokens and sequence numbers for proof of identity.
|
Name 3 data encryption tecnologies and state which one is the best.
|
Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard. (AES). AES is the best.
|
What is the key size of DES?
|
56 bits
|
What is symmetric encryption?
|
An algorithm where the key that is used for encryption is also used for decryption.
|
Which encryption technologies use symmetric encryption?
|
DES & TDES
|
What is asymmetric encryption?
|
Uses both a public & private key for both sender & receiver.
|
What is the name of a 3rd party that certifies public keys?
|
Certificate Authority (CA)
|
What is RSA?
|
A well-known public key encryption scheme.
|
Name an algorithm that allows the exchange of secret keys over a non-secure connection.
|
Diffie-Hellman
|