Exam 7: Cloud Computing and Remote Access
Exam 1: Introduction to Networking50 Questions
Exam 2: How Computers Find Each Other on Networks49 Questions
Exam 3: How Data Is Transported Over Networks50 Questions
Exam 4: Structured Cabling and Networking Elements50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Cloud Computing and Remote Access50 Questions
Exam 8: Network Risk Management50 Questions
Exam 9: Unified Communications and Network Performance Management50 Questions
Exam 10: Network Segmentation and Virtualization50 Questions
Exam 11: Wide Area Networks50 Questions
Exam 12: Industrial and Enterprise Networking50 Questions
Select questions type
What security principle provides proof of delivery and proof of the sender's identity?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
D
Matching
Match each correct item with the statement below.
-Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
H
When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
D
Matching
Match each correct item with the statement below.
-One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
(Multiple Choice)
4.9/5
(35)
After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.
(True/False)
4.8/5
(35)
What two key lengths are the most popular for the SHA-2 hashing algorithm?
(Multiple Choice)
4.7/5
(37)
Which of the following is NOT an encryption algorithmused by SSH?
(Multiple Choice)
4.8/5
(44)
Matching
Match each correct item with the statement below.
-A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
(Multiple Choice)
4.8/5
(40)
At what layer of the OSI model does the IPsec encryption protocol operate?
(Multiple Choice)
4.8/5
(36)
Matching
Match each correct item with the statement below.
-A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
(Multiple Choice)
4.7/5
(25)
The key management phase of IPSec is reliant on which two services below?
(Multiple Choice)
4.9/5
(36)
PPP can support several types of Network layer protocols that might use the connection.
(True/False)
4.8/5
(33)
Matching
Match each correct item with the statement below.
-An encryption keygeneration and management scheme used by 802.11i.
(Multiple Choice)
4.8/5
(33)
Digital certificates are issued by organizations known as what term?
(Multiple Choice)
4.8/5
(29)
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
(Multiple Choice)
4.9/5
(40)
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
(Multiple Choice)
4.8/5
(36)
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
(Multiple Choice)
5.0/5
(36)
What two different types of encryption can be used by IPsec during data transfer?
(Multiple Choice)
4.9/5
(31)
When PPP is used over an Ethernet network,it is known as ________________.
(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)