Exam 5: Network Authentication and Remote Access Using Vpn
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Describe how rule-based access controls can be implemented in the DAC model.
(Essay)
4.9/5
(38)
A ____ is an automatic phone-dialing program that dials every phone number in a configured range and checks to see if a person, answering machine, or modem answers.
(Multiple Choice)
4.7/5
(31)
Which access control principle is most frequently associated with data classification?
(Multiple Choice)
5.0/5
(36)
A bank's automated teller machine (ATM), which restricts authorized users to simple account queries, transfers, deposits, and withdrawals is an example of ____ access control.
(Multiple Choice)
5.0/5
(33)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Generally less expensive than hardware systems, and they tend to scale better on fast-growing networks.
(Short Answer)
4.9/5
(27)
The generally accepted definition of ____________________ refers to guessing, breaking, and/or stealing passwords to gain access to a system or application.
(Short Answer)
4.9/5
(34)
____________________ is the act of confirming the identity or user account.
(Short Answer)
4.8/5
(38)
Which authentication method is used when you want a client to be authenticated for each session?
(Multiple Choice)
4.9/5
(24)
Some VPNs use the term ____ to describe everything in the protected network behind the gateway.
(Multiple Choice)
4.8/5
(39)
A(n) ____________________ is basically an internal network restricted to employees within the organization, also using Internet technologies.
(Short Answer)
4.9/5
(41)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Used when a dial-up user has an old system that doesn't support L2TP and needs to use PPP to establish a VPN connection to your network.
(Short Answer)
4.8/5
(30)
IPSec ____ use a complex set of security protocols to protect information, including Internet Key Exchange (IKE), which provides for the exchange of security keys between the machines in the VPN.
(Multiple Choice)
4.8/5
(38)
____________________ is the process by which a computer system recognizes a user's identity.
(Short Answer)
4.7/5
(29)
Point-to-Point Protocol (PPP) over Secure Sockets Layer (SSL) and Point-to-Point Protocol (PPP) over Secure Shell (SSH) are two ____-based methods for creating VPNs.
(Multiple Choice)
4.8/5
(36)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-A hardware device specially designed to terminate VPNs and join multiple LANs.
(Short Answer)
4.8/5
(31)
Most personal computer operating systems use the mandatory access control (MAC) model.
(True/False)
4.9/5
(37)
Biometrics (retinal scans, fingerprints, and the like) are mainly used for ____ by large security-minded entities such as banking institutions and credit card centers for regulating access to sensitive information, but biometrics are also gaining ground in the general corporate world.
(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)