Deck 9: Secure Wireless Transmissions
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 9: Secure Wireless Transmissions
1
SSH can even be used as a tool for secure network backups.
True
2
In a ____ VPN, multiple sites can connect to other sites over the Internet.
A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
D
3
____ is a set of protocols developed to support the secure exchange of packets.
A) IPsec
B) UDP
C) HTTP
D) FTP
A) IPsec
B) UDP
C) HTTP
D) FTP
A
4
The ____ is a protocol used to manage networked equipment.
A) PPTP
B) SNMP
C) FTP
D) L2TP
A) PPTP
B) SNMP
C) FTP
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ key cryptography uses a single key to both encrypt and decrypt the document.
A) User
B) Private
C) Public
D) Known
A) User
B) Private
C) Public
D) Known
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ VPN is a user-to-LAN connection used by remote users.
A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.
A) LCP
B) PPPoE
C) L2TP
D) IPsec
A) LCP
B) PPPoE
C) L2TP
D) IPsec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
L2TP is only supported by Windows 2000 versions and higher.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.
A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.
A) PPP
B) SFTP
C) SCP
D) SSH
A) PPP
B) SFTP
C) SCP
D) SSH
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.
A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.
A) SNMPv3
B) SSH
C) IPsec
D) GPG
A) SNMPv3
B) SSH
C) IPsec
D) GPG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Linux operating system comes with a native cryptography system installed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.
A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ is a facility for transferring files securely.
A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.
A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.
A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.
A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
How can a user access FTP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.
A) passthrough
B) concentrator
C) built-in
D) PPTP
A) passthrough
B) concentrator
C) built-in
D) PPTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
In IPsec, key management is accomplished through a protocol known as ____.
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.
A) tube
B) tunnel
C) transport
D) lane
A) tube
B) tunnel
C) transport
D) lane
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Why is IPsec considered a transparent protocol?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the drawbacks of using public key and private key encryption for transmitting documents?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the main problems with private key cryptography?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly describe how SNMP works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
An enhanced feature of SSH is known as port forwarding, also called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
A VPN ____ aggregates hundreds or thousands of multiple connections together.
A) endpoint
B) tunnel
C) protocol
D) concentrator
A) endpoint
B) tunnel
C) protocol
D) concentrator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
How does SSH port forwarding work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
In IPsec, authentication is accomplished by the ____ protocol.
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In IPsec, confidentiality is achieved through the ____ protocol.
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How does SCP work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe how PGP (or GPG) works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some of the advantages of VPN technology?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the areas of protection provided by IPsec?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck