Exam 10: Setting up a Virtual Private Network
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Some VPNs use the term encryption ____ to describe everything in the protected network and behind the gateway.
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below.
-VPN that links two or more networks.
(Multiple Choice)
4.8/5
(34)
____________________ is a computer networking philosophy and a related set of protocols that are together used to evaluate the trustworthiness of a client wishing to join a network.
(Short Answer)
4.9/5
(35)
Match each item with a statement below.
-Inclusion of one data structure inside another data structure.
(Multiple Choice)
4.9/5
(27)
____ is a standard for secure encrypted communications developed by the Internet Engineering Task Force (IETF).
(Multiple Choice)
4.7/5
(29)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)