| ]

This item contains several questions that you must answer. You can view these questions by clicking on the Questions button to the left. Changing questions can be accomplished by clicking the numbers to the left of each question. In order to complete the questions, you will need to refer to the SDM and the topology, neither of which is currently visible.
To gain access to either the topology or the SDK click on the button to left side of the screen that corresponds to the section you wish to access. When you have finished viewing the topology the SDK you can return to your questions by clicking on the Questions button to the left.

IPSec_VPN_Topology.jpg

Question 1

Which IPSec rule is used for the Olympia branch and what does it define? (Choose two)

A - 102
B - 116
C - 127
D - IP traffic sourced from 10.10.10.0/24 destined to 10.5.15.0/24 will use the VPN.
E - IP traffic sourced from 10.10.10.0/24 destined to 10.8.28.0/24 will use the VPN.
F - IP traffic sourced from 10.10.10.0/24 destined to 10.5.33.0/24 will use the VPN.

Answer: B E

Explanation:

IPSec_VPN_1.jpg

From the output above, we learn that the IPSec Rule is 116. Next click on "IPSec Rules" and select the Name/Number of 116 to view the rule applied to it. You will see a "permit" rule for traffic from 10.10.10.0/24 to 10.8.28.0/24 (notice that the picture shown the wildcard masks, which are inverse subnet masks)

IPSec_VPN_8.jpg

Question 2

Which defined peer IP address an local subnet belong to Crete? (Choose two)

A - peer address 192.168.55.159
B - peer address 192.168.89.192
C - peer address 192.168.195.23
D - subnet 10.5.15.0/24
E - subnet 10.7.23.0/24
F - subnet 10.4.38.0/24

Answer: A D

Explanation

IPSec_VPN_Question_2.jpg

IPSec_VPN_Question_2_2.jpg

Question 3

Which algorithm as defined by the transform set is used for providing data confidentiality when connected to Tyre?

A - ESP-3DES-SHA
B - ESP-3DES-SHA1
C - ESP-3DES-SHA2
D- ESP-3DES
E - ESP-SHA-HMAC

Answer: D

Explanation:

In the site-to-site VPN branch we see something like this

IPSec_VPN_encrypt.jpg

but in the Tranform Set sub-branch, we see

IPSec_VPN_Question_3.jpg

so the answer should be ESP-3DES-SHA2 or ESP-3DES?

To answer this question, we should review the concept:

"Data confidentiality is the use of encryption to scramble data as it travels across an insecure media". Data confidentiality therefore means encryption.

"The transform set is a group of attributes that are exchanged together, which eliminates the need to coordinate and negotiate individual parameters". In the picture above, we can see 3 parts of the transform-set ESP-3DES-SHA2:

IPsec protocol: ESP
IPsec encryption type: 3DES
IPsec authentication: SHA2

The question wants to ask which algorithm is used for providing data confidentiality (encryption), therefore the answer should be D - ESP-3DES.

Question 4

Which peer authentication method and which IPSEC mode is used to connect to the branch locations? (Choose two)

A - Digital Certificate
B - Pre-Shared Key
C - Transport Mode
D - Tunnel Mode
E - GRE/IPSEC Transport Mode
F - GRE/IPSEC Tunnel Mode

Answer: B D

Explanation:

IPSec_VPN_Question_4_Tunnel.jpg

IPSec_VPN_Question_4_Preshared.jpg