IPsec vs VPN a1) Select the term that refers to the data recipient\'s ability to
ID: 3830139 • Letter: I
Question
IPsec vs VPN
a1) Select the term that refers to the data recipient's ability to ensure that the data was not altered in any fashion as the data was sent across the VPN:
A) Encryption.
B) Integrity.
C) Authentication.
D) Tunneling.
b2) Tunneling is a technique in which the IP datagram is first _______ and then _______.
A) Encapsulated in another datagram; encrypted.
B) Encrypted; encapsulated in another datagram.
C) Authenticated; encrypted.
D) Encrypted; authenticated.
c3) What is the relationship between a VPN and an extranet? Explain.
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) VPNs and extranets are the same type of network.
D) VPNs are unrelated to extranets.
d4) Which one is the best approach to VPNs? Explain.
A) VPN-specific gateway device.
B) Router-based.
C) Firewall-based.
D) Software only.
E) All of the above.
Explanation / Answer
a1) Integrity refers to the data being unaltered.
Answer: (B)
-------------
b2) First It is encrypted and then it is encapsulated.
Answer: (B)
-------------
c3) Answer is (B): Some extranets are VPNs and all VPNs are extranets.
Reason: This is because all VPNs provide outsiders to access protected network in a controlled manner. So all VPNs are clearly extranets.
But all of the extranets do not provide the facilities of a VPN.
------------
d4)
Answer is (E) All of the above
Reason: The approach depends on what the user wants. If the user already has router, they would choose to extend it for VPN. Someone who doesn't want to purchase hardware will choose softawre VPN.
And so on. Therefore, all options are perfectly viable.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.