Exam 9: Secure Wireless Transmissions

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

(Multiple Choice)
4.9/5
(25)

In IPsec, key management is accomplished through a protocol known as ____.

(Multiple Choice)
4.9/5
(34)

What are the drawbacks of using public key and private key encryption for transmitting documents?

(Essay)
4.9/5
(39)

Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.

(Multiple Choice)
4.9/5
(35)

Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.

(True/False)
4.7/5
(37)

Briefly describe how SNMP works.

(Essay)
4.8/5
(41)

What are the areas of protection provided by IPsec?

(Essay)
4.8/5
(34)

How can a user access FTP?

(Essay)
4.9/5
(36)

In a ____ VPN, multiple sites can connect to other sites over the Internet.

(Multiple Choice)
4.8/5
(41)

The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.

(Short Answer)
4.8/5
(35)

Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

(Multiple Choice)
4.8/5
(25)

____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.

(Multiple Choice)
4.9/5
(30)

____ is a protocol developed by Netscape for securely transmitting documents over the Internet.

(Multiple Choice)
4.9/5
(28)

____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

(Multiple Choice)
4.9/5
(32)

A VPN ____ aggregates hundreds or thousands of multiple connections together.

(Multiple Choice)
4.9/5
(41)

Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.

(True/False)
4.8/5
(43)

L2TP is only supported by Windows 2000 versions and higher.

(True/False)
4.8/5
(39)

In IPsec, authentication is accomplished by the ____ protocol.

(Multiple Choice)
4.8/5
(36)

An enhanced feature of SSH is known as port forwarding, also called ____________________.

(Short Answer)
4.8/5
(37)

____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

(Multiple Choice)
4.7/5
(26)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)