You work as the security administrator at Certkiller .com. You plan to implement a VPN (Virtual
Private Network). Which security consideration should you be aware of?
A.
Intruders can intercept VPN traffic and then launch a man in the middle attack.
B.
Captured data can be easily decrypted because there are only a finite number of encryption
keys.
C.
Tunneled data cannot be authenticated and authorized.
D.
Firewalls cannot inspect traffic that is encrypted.
Explanation:
A firewall can’t inspect traffic once it is channeled into a VPN. When a firewall sees a VPN
channel, it considers it as already passing security checks. The firewall does not have the ability to
see through the encrypted channel.
Incorrect Answers:
A: VPNtraffic is tunneled through the public network and cannot be intercepted.
B: Encrypted data cannot easily be decrypted.
C: A tunneled connection can be authenticated via RADIUS. Once connected, the normal network
management systems can be used for authorization and accounting.Reference:James Michael
Stewart, Security+ Fast Pass, San Francisco, Sybex, 2004, p 76.