Deck 9: Secure Wireless Transmissions

Full screen (f)
exit full mode
Question
SSH can even be used as a tool for secure network backups.
Use Space or
up arrow
down arrow
to flip the card.
Question
In a ____ VPN, multiple sites can connect to other sites over the Internet.

A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
Question
____ is a set of protocols developed to support the secure exchange of packets.

A) IPsec
B) UDP
C) HTTP
D) FTP
Question
The ____ is a protocol used to manage networked equipment.

A) PPTP
B) SNMP
C) FTP
D) L2TP
Question
____ key cryptography uses a single key to both encrypt and decrypt the document.

A) User
B) Private
C) Public
D) Known
Question
A ____ VPN is a user-to-LAN connection used by remote users.

A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
Question
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

A) LCP
B) PPPoE
C) L2TP
D) IPsec
Question
L2TP is only supported by Windows 2000 versions and higher.
Question
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
Question
The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Question
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP
B) SFTP
C) SCP
D) SSH
Question
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
Question
The ____ allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Question
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.

A) SNMPv3
B) SSH
C) IPsec
D) GPG
Question
The Linux operating system comes with a native cryptography system installed.
Question
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
Question
____ is a facility for transferring files securely.

A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
Question
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
Question
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.

A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
Question
____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
Question
How can a user access FTP?
Question
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.

A) passthrough
B) concentrator
C) built-in
D) PPTP
Question
In IPsec, key management is accomplished through a protocol known as ____.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Question
The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
Question
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
Question
IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.

A) tube
B) tunnel
C) transport
D) lane
Question
Why is IPsec considered a transparent protocol?
Question
What are the drawbacks of using public key and private key encryption for transmitting documents?
Question
What are the main problems with private key cryptography?
Question
Briefly describe how SNMP works.
Question
An enhanced feature of SSH is known as port forwarding, also called ____________________.
Question
A VPN ____ aggregates hundreds or thousands of multiple connections together.

A) endpoint
B) tunnel
C) protocol
D) concentrator
Question
How does SSH port forwarding work?
Question
In IPsec, authentication is accomplished by the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Question
A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
Question
In IPsec, confidentiality is achieved through the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Question
____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
Question
How does SCP work?
Question
Briefly describe how PGP (or GPG) works.
Question
What are some of the advantages of VPN technology?
Question
What are the areas of protection provided by IPsec?
Question
Match between columns
most widely deployed tunneling protocol.
SSH
most widely deployed tunneling protocol.
Layer 4-7 device
most widely deployed tunneling protocol.
IPsec tunnel mode
most widely deployed tunneling protocol.
HTTPS
most widely deployed tunneling protocol.
Endpoint
most widely deployed tunneling protocol.
VPN Client
most widely deployed tunneling protocol.
PPTP
most widely deployed tunneling protocol.
CFS
most widely deployed tunneling protocol.
Secure FTP (SFTP)
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
SSH
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Layer 4-7 device
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
IPsec tunnel mode
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Endpoint
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
PPTP
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
CFS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Secure FTP (SFTP)
encrypts both the header and the data portion.
SSH
encrypts both the header and the data portion.
Layer 4-7 device
encrypts both the header and the data portion.
IPsec tunnel mode
encrypts both the header and the data portion.
HTTPS
encrypts both the header and the data portion.
Endpoint
encrypts both the header and the data portion.
VPN Client
encrypts both the header and the data portion.
PPTP
encrypts both the header and the data portion.
CFS
encrypts both the header and the data portion.
Secure FTP (SFTP)
one of the ways to reduce the risk of FTP attack.
SSH
one of the ways to reduce the risk of FTP attack.
Layer 4-7 device
one of the ways to reduce the risk of FTP attack.
IPsec tunnel mode
one of the ways to reduce the risk of FTP attack.
HTTPS
one of the ways to reduce the risk of FTP attack.
Endpoint
one of the ways to reduce the risk of FTP attack.
VPN Client
one of the ways to reduce the risk of FTP attack.
PPTP
one of the ways to reduce the risk of FTP attack.
CFS
one of the ways to reduce the risk of FTP attack.
Secure FTP (SFTP)
encrypts all files or selected directories and files on a Linux system.
SSH
encrypts all files or selected directories and files on a Linux system.
Layer 4-7 device
encrypts all files or selected directories and files on a Linux system.
IPsec tunnel mode
encrypts all files or selected directories and files on a Linux system.
HTTPS
encrypts all files or selected directories and files on a Linux system.
Endpoint
encrypts all files or selected directories and files on a Linux system.
VPN Client
encrypts all files or selected directories and files on a Linux system.
PPTP
encrypts all files or selected directories and files on a Linux system.
CFS
encrypts all files or selected directories and files on a Linux system.
Secure FTP (SFTP)
the end of the tunnel between VPN devices.
SSH
the end of the tunnel between VPN devices.
Layer 4-7 device
the end of the tunnel between VPN devices.
IPsec tunnel mode
the end of the tunnel between VPN devices.
HTTPS
the end of the tunnel between VPN devices.
Endpoint
the end of the tunnel between VPN devices.
VPN Client
the end of the tunnel between VPN devices.
PPTP
the end of the tunnel between VPN devices.
CFS
the end of the tunnel between VPN devices.
Secure FTP (SFTP)
UNIX-based command interface and protocol for securely accessing a remote computer.
SSH
UNIX-based command interface and protocol for securely accessing a remote computer.
Layer 4-7 device
UNIX-based command interface and protocol for securely accessing a remote computer.
IPsec tunnel mode
UNIX-based command interface and protocol for securely accessing a remote computer.
HTTPS
UNIX-based command interface and protocol for securely accessing a remote computer.
Endpoint
UNIX-based command interface and protocol for securely accessing a remote computer.
VPN Client
UNIX-based command interface and protocol for securely accessing a remote computer.
PPTP
UNIX-based command interface and protocol for securely accessing a remote computer.
CFS
UNIX-based command interface and protocol for securely accessing a remote computer.
Secure FTP (SFTP)
"plain" HTTP sent over SSL/TLS.
SSH
"plain" HTTP sent over SSL/TLS.
Layer 4-7 device
"plain" HTTP sent over SSL/TLS.
IPsec tunnel mode
"plain" HTTP sent over SSL/TLS.
HTTPS
"plain" HTTP sent over SSL/TLS.
Endpoint
"plain" HTTP sent over SSL/TLS.
VPN Client
"plain" HTTP sent over SSL/TLS.
PPTP
"plain" HTTP sent over SSL/TLS.
CFS
"plain" HTTP sent over SSL/TLS.
Secure FTP (SFTP)
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
SSH
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Layer 4-7 device
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
IPsec tunnel mode
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
HTTPS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Endpoint
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
VPN Client
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
PPTP
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
CFS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Secure FTP (SFTP)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Secure Wireless Transmissions
1
SSH can even be used as a tool for secure network backups.
True
2
In a ____ VPN, multiple sites can connect to other sites over the Internet.

A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
D
3
____ is a set of protocols developed to support the secure exchange of packets.

A) IPsec
B) UDP
C) HTTP
D) FTP
A
4
The ____ is a protocol used to manage networked equipment.

A) PPTP
B) SNMP
C) FTP
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ key cryptography uses a single key to both encrypt and decrypt the document.

A) User
B) Private
C) Public
D) Known
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ VPN is a user-to-LAN connection used by remote users.

A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

A) LCP
B) PPPoE
C) L2TP
D) IPsec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
L2TP is only supported by Windows 2000 versions and higher.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP
B) SFTP
C) SCP
D) SSH
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.

A) SNMPv3
B) SSH
C) IPsec
D) GPG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Linux operating system comes with a native cryptography system installed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ is a facility for transferring files securely.

A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.

A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
How can a user access FTP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.

A) passthrough
B) concentrator
C) built-in
D) PPTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
In IPsec, key management is accomplished through a protocol known as ____.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.

A) tube
B) tunnel
C) transport
D) lane
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Why is IPsec considered a transparent protocol?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the drawbacks of using public key and private key encryption for transmitting documents?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the main problems with private key cryptography?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Briefly describe how SNMP works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
An enhanced feature of SSH is known as port forwarding, also called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
A VPN ____ aggregates hundreds or thousands of multiple connections together.

A) endpoint
B) tunnel
C) protocol
D) concentrator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
How does SSH port forwarding work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
In IPsec, authentication is accomplished by the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
In IPsec, confidentiality is achieved through the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
How does SCP work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe how PGP (or GPG) works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are some of the advantages of VPN technology?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the areas of protection provided by IPsec?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
most widely deployed tunneling protocol.
SSH
most widely deployed tunneling protocol.
Layer 4-7 device
most widely deployed tunneling protocol.
IPsec tunnel mode
most widely deployed tunneling protocol.
HTTPS
most widely deployed tunneling protocol.
Endpoint
most widely deployed tunneling protocol.
VPN Client
most widely deployed tunneling protocol.
PPTP
most widely deployed tunneling protocol.
CFS
most widely deployed tunneling protocol.
Secure FTP (SFTP)
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
SSH
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Layer 4-7 device
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
IPsec tunnel mode
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Endpoint
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
PPTP
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
CFS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Secure FTP (SFTP)
encrypts both the header and the data portion.
SSH
encrypts both the header and the data portion.
Layer 4-7 device
encrypts both the header and the data portion.
IPsec tunnel mode
encrypts both the header and the data portion.
HTTPS
encrypts both the header and the data portion.
Endpoint
encrypts both the header and the data portion.
VPN Client
encrypts both the header and the data portion.
PPTP
encrypts both the header and the data portion.
CFS
encrypts both the header and the data portion.
Secure FTP (SFTP)
one of the ways to reduce the risk of FTP attack.
SSH
one of the ways to reduce the risk of FTP attack.
Layer 4-7 device
one of the ways to reduce the risk of FTP attack.
IPsec tunnel mode
one of the ways to reduce the risk of FTP attack.
HTTPS
one of the ways to reduce the risk of FTP attack.
Endpoint
one of the ways to reduce the risk of FTP attack.
VPN Client
one of the ways to reduce the risk of FTP attack.
PPTP
one of the ways to reduce the risk of FTP attack.
CFS
one of the ways to reduce the risk of FTP attack.
Secure FTP (SFTP)
encrypts all files or selected directories and files on a Linux system.
SSH
encrypts all files or selected directories and files on a Linux system.
Layer 4-7 device
encrypts all files or selected directories and files on a Linux system.
IPsec tunnel mode
encrypts all files or selected directories and files on a Linux system.
HTTPS
encrypts all files or selected directories and files on a Linux system.
Endpoint
encrypts all files or selected directories and files on a Linux system.
VPN Client
encrypts all files or selected directories and files on a Linux system.
PPTP
encrypts all files or selected directories and files on a Linux system.
CFS
encrypts all files or selected directories and files on a Linux system.
Secure FTP (SFTP)
the end of the tunnel between VPN devices.
SSH
the end of the tunnel between VPN devices.
Layer 4-7 device
the end of the tunnel between VPN devices.
IPsec tunnel mode
the end of the tunnel between VPN devices.
HTTPS
the end of the tunnel between VPN devices.
Endpoint
the end of the tunnel between VPN devices.
VPN Client
the end of the tunnel between VPN devices.
PPTP
the end of the tunnel between VPN devices.
CFS
the end of the tunnel between VPN devices.
Secure FTP (SFTP)
UNIX-based command interface and protocol for securely accessing a remote computer.
SSH
UNIX-based command interface and protocol for securely accessing a remote computer.
Layer 4-7 device
UNIX-based command interface and protocol for securely accessing a remote computer.
IPsec tunnel mode
UNIX-based command interface and protocol for securely accessing a remote computer.
HTTPS
UNIX-based command interface and protocol for securely accessing a remote computer.
Endpoint
UNIX-based command interface and protocol for securely accessing a remote computer.
VPN Client
UNIX-based command interface and protocol for securely accessing a remote computer.
PPTP
UNIX-based command interface and protocol for securely accessing a remote computer.
CFS
UNIX-based command interface and protocol for securely accessing a remote computer.
Secure FTP (SFTP)
"plain" HTTP sent over SSL/TLS.
SSH
"plain" HTTP sent over SSL/TLS.
Layer 4-7 device
"plain" HTTP sent over SSL/TLS.
IPsec tunnel mode
"plain" HTTP sent over SSL/TLS.
HTTPS
"plain" HTTP sent over SSL/TLS.
Endpoint
"plain" HTTP sent over SSL/TLS.
VPN Client
"plain" HTTP sent over SSL/TLS.
PPTP
"plain" HTTP sent over SSL/TLS.
CFS
"plain" HTTP sent over SSL/TLS.
Secure FTP (SFTP)
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
SSH
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Layer 4-7 device
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
IPsec tunnel mode
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
HTTPS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Endpoint
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
VPN Client
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
PPTP
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
CFS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Secure FTP (SFTP)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.