Exam 5: Network Authentication and Remote Access Using Vpn

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which term refers to two connections over a VPN line?

(Multiple Choice)
4.8/5
(35)

Describe how rule-based access controls can be implemented in the DAC model.

(Essay)
4.9/5
(38)

A ____ is an automatic phone-dialing program that dials every phone number in a configured range and checks to see if a person, answering machine, or modem answers.

(Multiple Choice)
4.7/5
(31)

Describe the two IPSec modes of operation.

(Essay)
4.8/5
(36)

Which access control principle is most frequently associated with data classification?

(Multiple Choice)
5.0/5
(36)

A bank's automated teller machine (ATM), which restricts authorized users to simple account queries, transfers, deposits, and withdrawals is an example of ____ access control.

(Multiple Choice)
5.0/5
(33)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Generally less expensive than hardware systems, and they tend to scale better on fast-growing networks.

(Short Answer)
4.9/5
(27)

Describe how challenge-response passwords work.

(Essay)
4.8/5
(34)

The generally accepted definition of ____________________ refers to guessing, breaking, and/or stealing passwords to gain access to a system or application.

(Short Answer)
4.9/5
(34)

____________________ is the act of confirming the identity or user account.

(Short Answer)
4.8/5
(38)

Which authentication method is used when you want a client to be authenticated for each session?

(Multiple Choice)
4.9/5
(24)

Some VPNs use the term ____ to describe everything in the protected network behind the gateway.

(Multiple Choice)
4.8/5
(39)

A(n) ____________________ is basically an internal network restricted to employees within the organization, also using Internet technologies.

(Short Answer)
4.9/5
(41)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Used when a dial-up user has an old system that doesn't support L2TP and needs to use PPP to establish a VPN connection to your network.

(Short Answer)
4.8/5
(30)

IPSec ____ use a complex set of security protocols to protect information, including Internet Key Exchange (IKE), which provides for the exchange of security keys between the machines in the VPN.

(Multiple Choice)
4.8/5
(38)

____________________ is the process by which a computer system recognizes a user's identity.

(Short Answer)
4.7/5
(29)

Point-to-Point Protocol (PPP) over Secure Sockets Layer (SSL) and Point-to-Point Protocol (PPP) over Secure Shell (SSH) are two ____-based methods for creating VPNs.

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -A hardware device specially designed to terminate VPNs and join multiple LANs.

(Short Answer)
4.8/5
(31)

Most personal computer operating systems use the mandatory access control (MAC) model.

(True/False)
4.9/5
(37)

Biometrics (retinal scans, fingerprints, and the like) are mainly used for ____ by large security-minded entities such as banking institutions and credit card centers for regulating access to sensitive information, but biometrics are also gaining ground in the general corporate world.

(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)