Exam 7: Cloud Computing and Remote Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.

(Short Answer)
4.8/5
(34)

The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?

(Multiple Choice)
4.8/5
(30)

Describe how public key encryption works.

(Essay)
4.8/5
(34)

The SSH service listens on what TCP port?

(Multiple Choice)
4.9/5
(29)

Matching Match each correct item with the statement below. -In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.

(Multiple Choice)
4.8/5
(39)

The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.

(True/False)
4.7/5
(30)

Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.

(Essay)
4.8/5
(33)

Describe the three way handshake process as used by CHAP.

(Essay)
4.7/5
(37)

What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?

(Multiple Choice)
4.8/5
(33)

When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?

(Multiple Choice)
4.9/5
(42)

What two options below are AAA services?

(Multiple Choice)
4.8/5
(44)

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?

(Multiple Choice)
4.9/5
(32)

A _________________ is a service that is shared between multiple organizations,but not available publicly.

(Short Answer)
4.8/5
(35)

Matching Match each correct item with the statement below. -A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.

(Multiple Choice)
4.9/5
(37)

A SecurID key chain fob from RSA security generates a password that changes how often?

(Multiple Choice)
4.9/5
(33)

What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?

(Essay)
4.9/5
(28)

How often should administrators and network users be required to change their password?

(Multiple Choice)
4.9/5
(38)

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

(True/False)
4.8/5
(34)

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

(Multiple Choice)
4.7/5
(36)

Matching Match each correct item with the statement below. -A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)