LAB: Configure a VPN ConnectionYou are working on a small network. The owner has recently been awarded a contract position to assist with a research project. The owner will work from home on his Home-PC computer. To access the required data, he will need to make a VPN connection to the company through the internet.
  • Select Settings.Select Wi-Fi.Verify that you are connected to the Home-Wireless network.From the left menu, select General.Scroll down and select VPN.Select Add VPN Configuration.Select IPSec.In the Description field, enter the description.In the Server field, enter server IP address.In the Account field, enter account admin username.In the Secret field, enter the pass phrase.Click Save.Under VPN Configuration, set Not Connected to ON.Enter L3tM31nN0w (0 = zero) as the password.Click OK.
  • In the notification area, right-click the Network icon and select Open Network and Sharing Center.Select Set up a new connection or network to create the VPN.Select Connect to a workplace; then click Next.Select Use my Internet connection (VPN).Enter and select settings as necessary; then select Create.From the available networks, select Research VPN.In Network & Internet, select Research VPN.Select Advanced options.Under Connection properties, select Edit.Select the VPN type as required.Enter the username and password as required.Select Save.
  • IPsec
  • Your copy is the same as the copy posted on the website.
Which of the following can route Layer 3 protocols across an IP network?
  • IPsec
  • NAT
  • 1) Uses port 443.2) Encrypts the entire communication session.
  • GRE
Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic?
  • 1) L2TP2) PPTP
  • IPsec
  • NAT
  • GRE
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.Which key steps should you take when implementing this configuration? (Select two.)
  • Your copy is the same as the copy posted on the website.
  • 1) Uses port 443.2) Encrypts the entire communication session.
  • 1) Configure the browser to send HTTPS requests through the VPN connection.2) Configure the VPN connection to use IPsec.
  • VPN concentrator
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
  • Your copy is the same as the copy posted on the website.
  • NAT
  • PPTP
  • IPsec
A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through asingle server.Which solution should you implement?
  • VPN concentrator
  • 1) L2TP2) PPTP
  • 1) Configure the browser to send HTTPS requests through the VPN connection.2) Configure the VPN connection to use IPsec.
  • 1) ESP2) AH
IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)
  • IPsec
  • 1) ESP2) AH
  • 1) L2TP2) PPTP
  • 1) Uses port 443.2) Encrypts the entire communication session.
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two.)
  • 1) Uses port 443.2) Encrypts the entire communication session.
  • IPsec
  • 1) L2TP2) PPTP
  • 1) ESP2) AH
Which of the following networking devices or services prevents the use of IPsec in most cases?
  • GRE
  • IPsec
  • NAT
  • 1) L2TP2) PPTP
A VPN is used primarily for which purpose?
  • 1) Uses port 443.2) Encrypts the entire communication session.
  • IPsec
  • Your copy is the same as the copy posted on the website.
  • Support secured communications over an untrusted network.
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0