5. Which of the following permits IPsec to use external authentication services such as Kerberos and RADIUS?
a. EAP
b. PPP
c. CHAP
d. PAP
6. A VPN creates a secure, private network over the Internet through all the following
a. Authentication
b. Encryption
c. Packet tunneling
d. Firewalls
7. From a security viewpoint, which of the following should be the goal for a VPN?
a. Make only one exit point from a company’s network to the Internet.
b. Make only one entry point to a company’s network from the Internet.
c. Make only one destination point from a company’s network to the Internet.
d. Make only one transmission point from the Internet to a company’s network.
Sources and References
“Border Gateway Protocol Security (NIST SP 800-54),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, June 2007.
“Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i (NIST SP800-97),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, February 2007.
“Guide to Enterprise Telework and Remote Access Security (NIST SP800-46 Revision 1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, June 2009.
“Guidelines on Firewalls and Firewall Policy (NIST SP800-41 Revision 1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, September 2009.
“Guide to General Server Security (NIST SP800-123),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, July 2008.
“Guide to IPsec VPNs (NIST SP800-77),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, January 2005.
“Guide to Securing Legacy IEEE 802.11 Wireless Networks (NIST SP800-48R1),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, July 2008.
“Guidelines on Securing Public Web Servers (NIST SP800-44 Version 2),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, September 2007.
“Guide to Secure Web Services (NIST SP800-95),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, August 2007.
“Guide to SSL VPNs, (NIST SP800-113 Draft),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, August 2007.
“Guidelines for Securing Radio Frequency Identification (RFID) Systems (NIST SP800-98),” National Institute of Standards and Technology (NIST), The U.S. Department of Commerce, Gaithersburg, Maryland, April 2007.
“Guidelines on Cell Phone and PDA Security (NIST SP800-124),” National Institute of Standards and Technology (NIST), U.S. Department of Commerce, Gaithersburg, Maryland, October 2008.