Home > Articles > Cisco Network Technology > General Networking > Network Security and Virtual Private Network Technologies

Network Security and Virtual Private Network Technologies

Chapter Description

Network security can be a headache, especially when VPN technology is added to the mix. This chapter from the CCSP Self-Study text will help prepare you to deal with the complex security issues presented by virtual vrivate networks.

Review Questions

The following questions test your retention of the material presented in this chapter. The answers appear in Appendix A, "Answers to Chapter Review Questions."

  1. What two main protocols make up the IPSec framework?

  2. What IP protocol does ESP use?

  3. What are the two modes of IKE Phase 1?

  4. What three key lengths can AES currently use?

  5. What type of VPN would you be using if you are a user based at home connecting to the central site over a VPN by using a VPN Software Client installed on your laptop computer?

  6. What are the four steps of the Security Wheel?

  7. What is the normal method of key exchange for the encryption algorithms used in IPSec, such as DES, 3DES, and AES?

  8. What is the main issue with firewall-based VPNs?

  9. What are the two modes of IPSec operation?

  10. What three authentication methods are used in the IPSec protocol's origin identification feature?