Short Answer
Match each item with a statement below.
a.Site-to-site VPN
f.PPTP
b.Client-to-site VPN
g.L2TP
c.VPN appliance
h.Mesh configuration
d.Software VPN
i.Hub-and-spoke configuration
e.IPSec/IKE
-Each participant in the VPN has an approved relationship, called a security association (SA), with every other participant.
Correct Answer:

Verified
Correct Answer:
Verified
Q8: The growth and widespread use of the
Q9: Briefly describe multifactor authentication.
Q10: List and briefly describe the six functional
Q11: Separation of duties reduces the chance of
Q12: In order to implement MAC, a strict
Q14: A _ attack is time-intensive, so they
Q15: PPTP provides stronger protection than L2TP.
Q16: Which access control principle restricts users to
Q17: Describe how session authentication works.
Q18: Client authentication is similar to user authentication