Exam 7: Virtual Private Networks
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Which is NOT true about L2TP technology?
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
Which is NOT true about development of IPSec?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
____________ tunneling protocol is an older VPN protocol sometimes considered less secure than newer ones.
Free
(Short Answer)
4.9/5
(25)
Correct Answer:
Point-to-point
In a(n)____________ attack,the attacker records the actual transmission of a username and password in order to use the recording later to gain fraudulent access.
(Short Answer)
4.8/5
(29)
Which IPSec mode enables encryption of the header and data during a VPN connection?
(Multiple Choice)
4.8/5
(36)
Which is a very basic authentication protocol that transmits passwords in unencrypted clear text?
(Multiple Choice)
4.9/5
(36)
A PPTP tunneling capability that begins with a PPP dial-up and then permits the remote client to choose whether to launch a secure VPN session is called ____________ tunneling.
(Short Answer)
4.8/5
(38)
What encryption technology is used by the module offered by Cisco to provide VPN capability with Cisco switches and routers?
(Multiple Choice)
4.9/5
(34)
What makes SPAP susceptible to fraudulent login attacks via a recorded authentication exchange?
(Multiple Choice)
4.9/5
(31)
The part of a VPN connection in which the data is encapsulated is called a(n)____________.
(Short Answer)
4.9/5
(28)
Which common VPN technology supports five authentication methods?
(Multiple Choice)
4.8/5
(35)
Which authentication method was designed specifically for PPTP?
(Multiple Choice)
4.8/5
(43)
To serve its purpose,a(n)____________ allows a remote user to connect to a private network just as if he were at a local client inside the network.
(Short Answer)
4.9/5
(39)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)