Chapter Review Questions

1. Is it possible to have unencrypted VPNs?

2. What are the three types of VPNs?

3. Select three VPN features and benefits and explain how your organization can directly benefit from each.

4. VPN concentrators are designed for many users—explain how many and when they should be used.

5. Does the VPN Client Software for PCs support Apple’s powerful new operating system, Mac OS X?

6. When does split tunneling occur?

7. In relation to a data stream, what role does authentication play in securing it?

8. When tunneling data in IPsec, what three protocols play a role in the process?

9. In site-to-site VPNs, what are the two different encapsulating protocols and what are the differences between them?

10. Name three benefits of IKE.

11. What are three important differences between SSL and AnyConnect VPNs?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.50.222