Exam 5: Network Authentication and Remote Access Using Vpn

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Today, the widespread acceptance of IPSec with the IKE system means that proprietary protocols are used far more often.

Free
(True/False)
5.0/5
(33)
Correct Answer:
Verified

False

What is the advantage of using a hardware VPN appliance?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

The advantage of using a hardware VPN appliance is that it enables you to connect more tunnels and users than software systems do. If the server goes offline or crashes for some reason, the hardware VPN appliance doesn't go offline.

Which centralized authentication method is the latest and strongest version of a set of authentication protocols developed by Cisco Systems?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

A

Why is it important to rename a system default account?

(Essay)
4.8/5
(40)

A TCP/IP ____________________ is a channel or pathway over a packet network used by the VPN.

(Short Answer)
4.8/5
(39)

Describe the L2TP Layer 2 Tunneling Protocol (L2TP).

(Essay)
4.9/5
(29)

Which level in the U.S. military data classification scheme applies to any information or material the unauthorized disclosure of which reasonably could be expected to cause damage to the national security?

(Multiple Choice)
4.8/5
(39)

The growth and widespread use of the Internet has been coupled with the use of encryption technology to produce a solution for specific types of private communication channels: ____.

(Multiple Choice)
4.7/5
(38)

Briefly describe multifactor authentication.

(Essay)
4.8/5
(35)

List and briefly describe the six functional characteristic categories that can be used to categorize access controls.

(Essay)
4.7/5
(38)

Separation of duties reduces the chance of an individual violating information security policy and breaching the confidentiality, integrity, and availability of information.

(True/False)
4.9/5
(29)

In order to implement MAC, a strict user and data classification scheme is required.

(True/False)
4.9/5
(26)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Each participant in the VPN has an approved relationship, called a security association (SA), with every other participant.

(Short Answer)
4.9/5
(42)

A ____ attack is time-intensive, so they are rarely aimed at the target system in general.

(Multiple Choice)
4.8/5
(28)

PPTP provides stronger protection than L2TP.

(True/False)
4.9/5
(31)

Which access control principle restricts users to having access appropriate to the level required for their assigned duties?

(Multiple Choice)
4.8/5
(34)

Describe how session authentication works.

(Essay)
4.8/5
(36)

Client authentication is similar to user authentication but with the addition of ____.

(Multiple Choice)
4.9/5
(37)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -A network accessible to remote users who need dial-in access.

(Short Answer)
4.9/5
(44)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -A single VPN router contains records of all SAs in the VPN.

(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)