Exam 7: Cloud Computing and Remote Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What security principle provides proof of delivery and proof of the sender's identity?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

D

Matching Match each correct item with the statement below. -Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

H

When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

D

Matching Match each correct item with the statement below. -One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.

(Multiple Choice)
4.9/5
(35)

After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.

(True/False)
4.8/5
(35)

What two key lengths are the most popular for the SHA-2 hashing algorithm?

(Multiple Choice)
4.7/5
(37)

Which of the following is NOT an encryption algorithmused by SSH?

(Multiple Choice)
4.8/5
(44)

How is GRE used by the PPP protocol?

(Essay)
4.9/5
(35)

Matching Match each correct item with the statement below. -A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.

(Multiple Choice)
4.8/5
(40)

At what layer of the OSI model does the IPsec encryption protocol operate?

(Multiple Choice)
4.8/5
(36)

Matching Match each correct item with the statement below. -A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.

(Multiple Choice)
4.7/5
(25)

The key management phase of IPSec is reliant on which two services below?

(Multiple Choice)
4.9/5
(36)

PPP can support several types of Network layer protocols that might use the connection.

(True/False)
4.8/5
(33)

Matching Match each correct item with the statement below. -An encryption keygeneration and management scheme used by 802.11i.

(Multiple Choice)
4.8/5
(33)

Digital certificates are issued by organizations known as what term?

(Multiple Choice)
4.8/5
(29)

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

(Multiple Choice)
4.9/5
(40)

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

(Multiple Choice)
4.8/5
(36)

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

(Multiple Choice)
5.0/5
(36)

What two different types of encryption can be used by IPsec during data transfer?

(Multiple Choice)
4.9/5
(31)

When PPP is used over an Ethernet network,it is known as ________________.

(Short Answer)
4.7/5
(36)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)