IKE Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which SA is negotiated during phase 1?

  • Both IKE SA and IPsec SA
  • Neither IKE SA nor IPsec SA
  • IPsec SA
  • IKE SA (correct)
  • Which SA is used for encrypting the data sent through the tunnel?

  • IPsec SA (correct)
  • Neither IKE SA nor IPsec SA
  • IKE SA
  • Both IKE SA and IPsec SA
  • Which version of IKE is considered the legacy version?

  • Both IKE-v1 and IKE-v2
  • IKE-v1 (correct)
  • Neither IKE-v1 nor IKE-v2
  • IKE-v2
  • Which version of IKE is considered simpler to operate?

    <p>IKE-v2</p> Signup and view all the answers

    Which version of IKE exclusively supports the network ID feature?

    <p>IKE-v2</p> Signup and view all the answers

    Which version of IKE is best suited for SD-WAN deployments?

    <p>IKE-v2</p> Signup and view all the answers

    Which version of IKE supports denying access to spokes without using a certificate signature?

    <p>IKE-v1</p> Signup and view all the answers

    Which version of IKE supports establishing multiple AD-VPN shortcuts between the same pair of local and remote gateway addresses?

    <p>IKE-v2</p> Signup and view all the answers

    Which version of IKE is often preferred for security-wise deployments?

    <p>IKE-v2</p> Signup and view all the answers

    Which topology is commonly used in SD-WAN deployments using IPsec overlays?

    <p>Hub-and-spoke topology</p> Signup and view all the answers

    Which protocol negotiates the private keys, authentication method, and encryption for creating an IPsec tunnel?

    <p>IKE-v2</p> Signup and view all the answers

    What is the outcome of Phase 1 in IKE?

    <p>IKE SA</p> Signup and view all the answers

    What is the outcome of Phase 2 in IKE?

    <p>IPsec SA</p> Signup and view all the answers

    Which version of IKE is known for its wider adoption and is considered legacy?

    <p>IKE-v1</p> Signup and view all the answers

    Which version of IKE is known for its simpler operation, more features, and increasing adoption?

    <p>IKE-v2</p> Signup and view all the answers

    Which version of IKE is usually preferred for SD-WAN and has a network ID feature for AD-VPN?

    <p>IKE-v2</p> Signup and view all the answers

    What are SAs in the context of IPsec?

    <p>Security Associations</p> Signup and view all the answers

    What happens if both sides cannot agree on the security rules for sending data and verifying each other's identity in an IPsec tunnel?

    <p>The tunnel is terminated</p> Signup and view all the answers

    What needs to happen when SAs expire in an IPsec tunnel?

    <p>They need to be renewed</p> Signup and view all the answers

    How many distinct phases does IKE use?

    <p>2</p> Signup and view all the answers

    Which direction is most of the IPsec overlay traffic initiated from?

    <p>Spoke to hub</p> Signup and view all the answers

    Where are the workloads located that are protected by the hub?

    <p>On both the hub and the spokes</p> Signup and view all the answers

    Why is SD-WAN usually deployed on the spokes only?

    <p>Because most of the traffic is initiated in the spoke-to-hub direction</p> Signup and view all the answers

    In which direction is traffic also initiated, requiring SD-WAN on the hub side?

    <p>Hub to spoke</p> Signup and view all the answers

    What routing protocol is used to exchange routing information through the overlays?

    <p>BGP</p> Signup and view all the answers

    What are the IP subnets used for the overlays established over the ISP1 underlay?

    <p>10.201.1.0/24</p> Signup and view all the answers

    What are the IP subnets used for the overlays established over the ISP2 underlay?

    <p>10.202.1.0/24</p> Signup and view all the answers

    What is the goal for all sites in terms of exchanging prefixes over overlays?

    <p>To exchange prefixes over all available overlays</p> Signup and view all the answers

    Why is dynamic routing preferred over static routing in this scenario?

    <p>Because of scalability reasons and AD-VPN requirements</p> Signup and view all the answers

    What is AD-VPN?

    <p>A type of VPN that uses dynamic routing</p> Signup and view all the answers

    More Like This

    Mastering Bandwidth SLA
    20 questions

    Mastering Bandwidth SLA

    VisionarySugilite avatar
    VisionarySugilite
    Introduction to Internet Key Exchange (IKE)
    13 questions
    Use Quizgecko on...
    Browser
    Browser