O'Reilly logo

CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition by Andrew G. Mason

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Answers to the Review Questions

1:

What two main protocols make up the IPSec framework?

A1:

Answer AH and ESP

2:

What IP protocol does ESP use?

A2:

Answer ESP is IP protocol 50.

3:

What are the two modes of IKE Phase 1?

A3:

Answer Main mode and aggressive mode

4:

What three key lengths can AES currently use?

A4:

Answer Currently, AES supports 128-, 192-, and 256-bit encryption keys.

5:

What type of VPN would you be using if you are a user based at home connecting to the central site over a VPN by using a VPN Software Client installed on your laptop computer?

A5:

Answer This type of VPN is classed as a remote-access VPN. This is because the VPN connection is created between the VPN Software Client and the VPN headend device at the central ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required