Exam 5: Network Authentication and Remote Access Using Vpn
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Today, the widespread acceptance of IPSec with the IKE system means that proprietary protocols are used far more often.
Free
(True/False)
5.0/5
(33)
Correct Answer:
False
What is the advantage of using a hardware VPN appliance?
Free
(Essay)
4.9/5
(38)
Correct Answer:
The advantage of using a hardware VPN appliance is that it enables you to connect more tunnels and users than software systems do. If the server goes offline or crashes for some reason, the hardware VPN appliance doesn't go offline.
Which centralized authentication method is the latest and strongest version of a set of authentication protocols developed by Cisco Systems?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
A TCP/IP ____________________ is a channel or pathway over a packet network used by the VPN.
(Short Answer)
4.8/5
(39)
Which level in the U.S. military data classification scheme applies to any information or material the unauthorized disclosure of which reasonably could be expected to cause damage to the national security?
(Multiple Choice)
4.8/5
(39)
The growth and widespread use of the Internet has been coupled with the use of encryption technology to produce a solution for specific types of private communication channels: ____.
(Multiple Choice)
4.7/5
(38)
List and briefly describe the six functional characteristic categories that can be used to categorize access controls.
(Essay)
4.7/5
(38)
Separation of duties reduces the chance of an individual violating information security policy and breaching the confidentiality, integrity, and availability of information.
(True/False)
4.9/5
(29)
In order to implement MAC, a strict user and data classification scheme is required.
(True/False)
4.9/5
(26)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Each participant in the VPN has an approved relationship, called a security association (SA), with every other participant.
(Short Answer)
4.9/5
(42)
A ____ attack is time-intensive, so they are rarely aimed at the target system in general.
(Multiple Choice)
4.8/5
(28)
Which access control principle restricts users to having access appropriate to the level required for their assigned duties?
(Multiple Choice)
4.8/5
(34)
Client authentication is similar to user authentication but with the addition of ____.
(Multiple Choice)
4.9/5
(37)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-A network accessible to remote users who need dial-in access.
(Short Answer)
4.9/5
(44)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-A single VPN router contains records of all SAs in the VPN.
(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)