Which security consideration should you be aware of?

You work as the security administrator at Certkiller .com. You plan to implement a VPN (Virtual
Private Network). Which security consideration should you be aware of?

You work as the security administrator at Certkiller .com. You plan to implement a VPN (Virtual
Private Network). Which security consideration should you be aware of?

A.
Intruders can intercept VPN traffic and then launch a man in the middle attack.

B.
Captured data can be easily decrypted because there are only a finite number of encryption
keys.

C.
Tunneled data cannot be authenticated and authorized.

D.
Firewalls cannot inspect traffic that is encrypted.

Explanation:
A firewall can’t inspect traffic once it is channeled into a VPN. When a firewall sees a VPN
channel, it considers it as already passing security checks. The firewall does not have the ability to
see through the encrypted channel.
Incorrect Answers:
A: VPNtraffic is tunneled through the public network and cannot be intercepted.
B: Encrypted data cannot easily be decrypted.
C: A tunneled connection can be authenticated via RADIUS. Once connected, the normal network
management systems can be used for authorization and accounting.Reference:James Michael
Stewart, Security+ Fast Pass, San Francisco, Sybex, 2004, p 76.



Leave a Reply 0

Your email address will not be published. Required fields are marked *