Exam 5: Network Authentication and Remote Access Using Vpn

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

(Multiple Choice)
4.9/5
(31)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Rapidly becoming the protocol of choice for VPN connections of all sorts and should be used when the other protocols are not acceptable.

(Short Answer)
4.9/5
(35)

____ are hardware devices or software modules that perform encryption to secure data, perform authentication to make sure the host requesting the data is an approved user of the VPN, and perform encapsulation to protect the integrity of the information being sent.

(Multiple Choice)
4.9/5
(25)

Which centralized authentication method uses UDP?

(Multiple Choice)
4.7/5
(39)

Which access control process documents the activities of the authenticated individual and systems?

(Multiple Choice)
4.7/5
(34)

Describe the drawbacks of using a VPN.

(Essay)
4.9/5
(32)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Used when a dial-up user needs to establish a VPN connection with your network.

(Short Answer)
4.8/5
(37)

Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Links two or more networks.

(Short Answer)
4.9/5
(27)

A ____ is one in which the computer system enforces the controls without the input or intervention of the system or data owner.

(Multiple Choice)
4.9/5
(28)

VPNs protect packets by performing IP ____, the process of enclosing a packet within another one that has different IP source and destination information.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)