Chapter 17
A1: | d |
A2: | b,d |
A3: | b,c,e |
A4: | a,c |
A5: | b,c,d |
A6: | b |
A7: | b |
A8: | b |
A9: | b |
A10: | c |
Q&A
1: | What workers are considered within the remote-user design model? |
A1: | MobileHome-office |
2: | What are the four design options available within the remote-user design model? |
A2: | Remote-site firewallRemote-site routerVPN hardware clientCisco VPN Client |
3: | What modes can the VPN hardware client operate in? |
A3: | Client modeNetwork extension mode |
4: | The Cisco VPN Client uses _____ and ____ types of authentication. |
A4: | Group, user |
5: | What are the additional benefits that the remote-site router provides compared to the remote-site firewall option? |
A5: | Advance router functionality, such as QoS, and the capability to integrate the broadband access device into a single device. |
6: | What type of filter is used to prevent IP spoofing attacks? |
A6: | RFC 2827 filtering mitigates IP spoofing attacks. |
7: | What happens to the security perimeter of an organization when it is using the remote-user design model? |
A7: | When using the remote-user design model, the security of an organization is extended to include the remote site. |
8: | What is the difference between the VPN tunnel types: tunnel-everything and split tunnel? |
A8: | Tunnel-everything Only remote-site traffic that is specifically defined will traverse the VPN tunnel; all other traffic follows the appropriate routes.Split-tunnel All remote-site traffic, whatever the destination, traverses the VPN tunnel. |
9: | How is the remote-site firewall design option remotely managed? |
A9: | Remote management of the firewall in the remote-site firewall option uses an IPSec VPN tunnel from the central site that terminates directly onto the firewall. |