Exam 5: Network Authentication and Remote Access Using Vpn
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Rapidly becoming the protocol of choice for VPN connections of all sorts and should be used when the other protocols are not acceptable.
(Short Answer)
4.9/5
(35)
____ are hardware devices or software modules that perform encryption to secure data, perform authentication to make sure the host requesting the data is an approved user of the VPN, and perform encapsulation to protect the integrity of the information being sent.
(Multiple Choice)
4.9/5
(25)
Which access control process documents the activities of the authenticated individual and systems?
(Multiple Choice)
4.7/5
(34)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Used when a dial-up user needs to establish a VPN connection with your network.
(Short Answer)
4.8/5
(37)
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Links two or more networks.
(Short Answer)
4.9/5
(27)
A ____ is one in which the computer system enforces the controls without the input or intervention of the system or data owner.
(Multiple Choice)
4.9/5
(28)
VPNs protect packets by performing IP ____, the process of enclosing a packet within another one that has different IP source and destination information.
(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)