- Home
- Networking
- CCNA Security
46.
You would use ESP because it supports both encryption and authentication. ESP uses
IP Protocol 50.
- A.ESP
- B.AH
- C.51
- D.50
- Answer & Explanation
- Report
Answer : [A, D]
Explanation :
Explanation :
You would use ESP because it supports both encryption and authentication. ESP uses IP Protocol 50. |
47.
What is another name for a Phase 2 IKE tunnel? (Choose two.)
- A.Phase 2 SA
- B.IKE 2
- C.IPsec
- D.IPsec tunnel
- Answer & Explanation
- Report
Answer : [A, D]
Explanation :
Explanation :
A Phase 2 IKE tunnel is also known as a Phase 2 SA (security association) or an IPsec Tunnel. |
48.
You ' ve just configured a VPN tunnel with a remote site. When looking at the output from
the show crypto isakmp sa , you notice the message MM_NO_STATE . What might be the
problem? (Choose all that apply.)
- A.Access lists don't match
- B.Preshared keys don't match
- C.ISAKMP policies don't match
- D.Encryption protocols don't match
- Answer & Explanation
- Report
Answer : [A, B]
Explanation :
Explanation :
MM_NO_STATE typically means that either the preshared keys don't match at both ends or the access list that defines interesting traffic doesn't match. Or it could mean both of those don't match. |
49.
When configuring a site - to - site VPN, what is the type that is designated when using a
crypto map?
- A.IPSEC
- B.ISAKMP
- C.IPSEC - ISAKMP
- D.ISAKMP - IPSEC
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The correct answer is IPSEC - ISAKMP. |
50.
Put the following steps in the order in which they occur.
- A.Traffic matches interesting traffic ACL.
- B.Phase 2 or IPsec tunnel is set up.
- C.Traffic flows over the VPN tunnel.
- D.Phase 1 ISAKMP SA is formed.
- Answer & Explanation
- Report
Answer : [A, D, B, C]
Explanation :
Explanation :
Traffic must match the interesting traffi c ACL, then the Phase 1 ISAKMP SA is negotiated and formed, the Phase 2 or IPsec tunnel is then formed, and fi nally, traffic flows over the tunnel. |