3.2 Secure Network Communication Technologies (VPN, SD-WAN, and SASE) Flashcards

(20 cards)

1
Q

What is the primary function of a Virtual Private Network (VPN)?

A

To enable secure communication back to corporate network resources from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What key action does a VPN perform on private data?

A

It encrypts all private data and sends it securely across a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a VPN concentrator?

A

A purpose-built device or capability that acts as the secure endpoint for remote users connecting via the encrypted VPN link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main responsibility of a VPN concentrator?

A

Managing the connections and decrypting the secure traffic upon arrival.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is a packet ‘tunneled’ in an IPsec VPN connection?

A

The original IP header and private data are encrypted, a new IPsec header and trailer are added, and a new outer IP header points to the concentrator’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why are SSL/TLS VPNs effective at passing through existing network firewalls?

A

They use the same protocol and TCP port (443) as encrypted web server traffic, which is typically allowed by firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a typical use case for an SSL/TLS VPN?

A

Remote access communication from a single device, such as a laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does an SSL/TLS VPN setup differ from a site-to-site VPN?

A

An SSL VPN typically relies on common login credentials rather than requiring digital certificates or shared passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does an organization create a ‘site-to-site’ connection using an IPsec VPN?

A

By configuring the firewalls at both remote locations to act as the VPN endpoints, automatically building an encrypted tunnel between the sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What motivated the development of SD-WAN?

A

To address the challenges of connecting efficiently to distributed, cloud-based applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does SD-WAN differ from traditional centralized network designs?

A

It creates flexible, dynamic networks optimized for application access rather than centralizing all communication through an on-premises data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What network inefficiency does a traditional WAN structure create?

A

Remote sites must communicate to a centralized data center before reaching cloud applications, increasing latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SASE stand for?

A

Secure Access Service Edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of SASE in relation to VPN technology?

A

It integrates security services directly into the cloud next to applications, allowing secure connections to cloud-based services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How might an organization combine multiple secure communication technologies?

A

By using SSL VPNs for remote access and IPsec site-to-site VPNs for branch offices, while implementing SD-WAN and SASE for optimized cloud traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: A VPN is a secure form of communication that _______ all private data and sends it across a public network.

17
Q

What is the function of encryption in a VPN?

A

To convert data into a coded format to prevent unauthorized access.

18
Q

Define IPsec.

A

A suite of protocols used to secure IP communication by authenticating and encrypting each IP packet.

19
Q

What is tunneling?

A

The process of encapsulating one type of network protocol within another to allow secure transmission.

20
Q

What is the standard TCP port used for SSL/TLS?