Exam 9: Secure Wireless Transmissions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Linux operating system comes with a native cryptography system installed.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

False

A ____ VPN is a user-to-LAN connection used by remote users.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

In IPsec, confidentiality is achieved through the ____ protocol.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.

(Multiple Choice)
4.9/5
(39)

What are the main problems with private key cryptography?

(Essay)
4.9/5
(35)

____ key cryptography uses a single key to both encrypt and decrypt the document.

(Multiple Choice)
4.9/5
(32)

IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.

(Multiple Choice)
4.8/5
(37)

SSH can even be used as a tool for secure network backups.

(True/False)
4.8/5
(35)

____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

(Multiple Choice)
4.9/5
(32)

The ____ is a protocol used to manage networked equipment.

(Multiple Choice)
4.8/5
(39)

How does SSH port forwarding work?

(Essay)
4.8/5
(26)

Briefly describe how PGP (or GPG) works.

(Essay)
4.8/5
(42)

Why is IPsec considered a transparent protocol?

(Essay)
4.8/5
(41)

What are some of the advantages of VPN technology?

(Essay)
4.8/5
(35)

____ is a set of protocols developed to support the secure exchange of packets.

(Multiple Choice)
4.8/5
(33)

____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).

(Short Answer)
4.8/5
(32)

A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.

(Short Answer)
4.7/5
(32)

How does SCP work?

(Essay)
4.8/5
(35)
Match each item with an statement below:
most widely deployed tunneling protocol.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
encrypts both the header and the data portion.
CFS
Correct Answer:
Verified
Premises:
Responses:
most widely deployed tunneling protocol.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
encrypts both the header and the data portion.
CFS
one of the ways to reduce the risk of FTP attack.
SSH
encrypts all files or selected directories and files on a Linux system.
Layer 4-7 device
the end of the tunnel between VPN devices.
IPsec tunnel mode
UNIX-based command interface and protocol for securely accessing a remote computer.
PPTP
"plain" HTTP sent over SSL/TLS.
Endpoint
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Secure FTP (SFTP)
(Matching)
4.8/5
(33)

The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.

(Short Answer)
4.8/5
(29)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)