Chapter Review Questions
The following review questions cover some of the key facts and concepts that were introduced in this chapter. Answers to these questions can be found in Appendix A, “Answers to Chapter Review Questions.”
1: | What are the two major types of VPN solutions that were discussed in this chapter? |
2: | What makes the DH public key exchange such a versatile tool? |
3: | What three peer authentication methods can be used with IPSec? |
4: | Which IPSec protocol provides both confidentiality and authentication? |
5: | What are the five steps of IPSec? |
6: | What is the purpose of a transform set? |
7: | What are the five IKE phase 1 policy parameters? |
8: | What command do you use to define an IKE policy? |
9: | What command would you use to define an IKE pre-shared key of Key1234 ... |
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.