1: | Name three types of VPN solutions. |
2: | What are the four major functions of IPSec? |
3: | Describe the two HMAC algorithms that are commonly used today to provide data integrity. |
4: | What are the three peer authentication methods used in IPSec? |
5: | There are two main IPSec framework protocols available. State their names and give a brief explanation of what they do. |
6: | Both ESP and AH can be applied to IP packets in two different ways. List those two modes and explain the difference between them. |
7: | List the functions for which IKE Phase 1 is responsible. |
8: | List the functions for which IKE Phase 2 is responsible. |
9: | What steps should be completed before configuring a device to use IPSec? |
10: |