The following questions test your retention of the material presented in this chapter. The answers appear in Appendix A, "Answers to Chapter Review Questions."
What two main protocols make up the IPSec framework?
What IP protocol does ESP use?
What are the two modes of IKE Phase 1?
What three key lengths can AES currently use?
What type of VPN would you be using if you are a user based at home connecting to the central site over a VPN by using a VPN Software Client installed on your laptop computer?
What are the four steps of the Security Wheel?
What is the normal method of key exchange for the encryption algorithms used in IPSec, such as DES, 3DES, and AES?
What is the main issue with firewall-based VPNs?
What are the two modes of IPSec operation?
What three authentication methods are used in the IPSec protocol's origin identification feature?