Exam 9: Secure Wireless Transmissions
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.
(Multiple Choice)
4.9/5
(25)
In IPsec, key management is accomplished through a protocol known as ____.
(Multiple Choice)
4.9/5
(34)
What are the drawbacks of using public key and private key encryption for transmitting documents?
(Essay)
4.9/5
(39)
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.
(Multiple Choice)
4.9/5
(35)
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
(True/False)
4.7/5
(37)
In a ____ VPN, multiple sites can connect to other sites over the Internet.
(Multiple Choice)
4.8/5
(41)
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
(Short Answer)
4.8/5
(35)
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.
(Multiple Choice)
4.8/5
(25)
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.
(Multiple Choice)
4.9/5
(30)
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.
(Multiple Choice)
4.9/5
(28)
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.
(Multiple Choice)
4.9/5
(32)
A VPN ____ aggregates hundreds or thousands of multiple connections together.
(Multiple Choice)
4.9/5
(41)
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
(True/False)
4.8/5
(43)
In IPsec, authentication is accomplished by the ____ protocol.
(Multiple Choice)
4.8/5
(36)
An enhanced feature of SSH is known as port forwarding, also called ____________________.
(Short Answer)
4.8/5
(37)
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.
(Multiple Choice)
4.7/5
(26)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)