Deck 12: Security Protocols, VPNS, and Firewalls

Full screen (f)
exit full mode
Question
Which of the following is not a secured mail transferring methodology?

A)pop3
B)ssmtp
C)mail using pgp
D)s/mime
Use Space or
up arrow
down arrow
to flip the card.
Question
__________ is used for encrypting data at network level.

A)ipsec
B)https
C)smtp
D)s/mime
Question
PGP encrypts data by using a block cipher called ______

A)international data encryption algorithm
B)private data encryption algorithm
C)internet data encryption algorithm
D)local data encryption algorithm
Question
When were VPNs introduced into the commercial world?

A)early 80's
B)late 80's
C)early 90's
D)late 90's
Question
What protocol is NOT used in the operation of a VPN?

A)pptp
B)ipsec
C)ymum
D)l2tp
Question
Which of the following statements is NOT true concerning VPNs?

A)financially rewarding compared to leased lines
B)allows remote workers to access corporate data
C)allows lan-to-lan connectivity over public networks
D)is the backbone of the internet
Question
Traffic in a VPN is NOT ____________

A)invisible from public networks
B)logically separated from other traffic
C)accessible from unauthorized public networks
D)restricted to a single protocol in ipsec
Question
Which layer 3 protocols can be transmitted over an L2TP VPN?

A)only ip
B)only ipx
C)only icmp
D)ip and ipx
Question
ESP (Encapsulating Security Protocol) is defined in which of the following standards?

A)ipsec
B)pptp
C)ppp
D)l2tp
Question
L2F was developed by which company?

A)microsoft
B)cisco
C)blizzard entertainment
D)ietf
Question
Firewalls can be of _______ kinds.

A)1
B)2
C)3
D)4
Question
_________________ is the kind of firewall is connected between the device and the network connecting to internet.

A)hardware firewall
B)software firewall
C)stateful inspection firewall
D)microsoft firewall
Question
_________ is software that is installed using an internet connection or they come by-default with operating systems.

A)hardware firewall
B)software firewall
C)stateful inspection firewall
D)microsoft firewall
Question
Firewall examines each ____________ that are entering or leaving the internal network.

A)emails users
B)updates
C)connections
D)data packets
Question
A firewall protects which of the following attacks?

A)phishing
B)dumpster diving
C)denial of service (dos)
D)shoulder surfing
Question
There are ______ types of firewall.

A)5
B)4
C)3
D)2
Question
Packet filtering firewalls are deployed on ________

A)routers
B)switches
C)hubs
D)repeaters
Question
In the ______________ layer of OSI model, packet filtering firewalls are implemented.

A)application layer
B)session layer
C)presentation layer
D)network layer
Question
The __________ defines the packet filtering firewall rules.

A)access control list
B)protocols
C)policies
D)ports
Question
ACL stands for _____________

A)access condition list
B)anti-control list
C)access control logs
D)access control list
Question
When a packet does not fulfil the ACL criteria, the packet is _________

A)resend
B)dropped
C)destroyed
D)acknowledged as received
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Security Protocols, VPNS, and Firewalls
1
Which of the following is not a secured mail transferring methodology?

A)pop3
B)ssmtp
C)mail using pgp
D)s/mime
pop3
2
__________ is used for encrypting data at network level.

A)ipsec
B)https
C)smtp
D)s/mime
ipsec
3
PGP encrypts data by using a block cipher called ______

A)international data encryption algorithm
B)private data encryption algorithm
C)internet data encryption algorithm
D)local data encryption algorithm
international data encryption algorithm
4
When were VPNs introduced into the commercial world?

A)early 80's
B)late 80's
C)early 90's
D)late 90's
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
What protocol is NOT used in the operation of a VPN?

A)pptp
B)ipsec
C)ymum
D)l2tp
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following statements is NOT true concerning VPNs?

A)financially rewarding compared to leased lines
B)allows remote workers to access corporate data
C)allows lan-to-lan connectivity over public networks
D)is the backbone of the internet
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
Traffic in a VPN is NOT ____________

A)invisible from public networks
B)logically separated from other traffic
C)accessible from unauthorized public networks
D)restricted to a single protocol in ipsec
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
Which layer 3 protocols can be transmitted over an L2TP VPN?

A)only ip
B)only ipx
C)only icmp
D)ip and ipx
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
ESP (Encapsulating Security Protocol) is defined in which of the following standards?

A)ipsec
B)pptp
C)ppp
D)l2tp
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
L2F was developed by which company?

A)microsoft
B)cisco
C)blizzard entertainment
D)ietf
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
Firewalls can be of _______ kinds.

A)1
B)2
C)3
D)4
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
_________________ is the kind of firewall is connected between the device and the network connecting to internet.

A)hardware firewall
B)software firewall
C)stateful inspection firewall
D)microsoft firewall
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
_________ is software that is installed using an internet connection or they come by-default with operating systems.

A)hardware firewall
B)software firewall
C)stateful inspection firewall
D)microsoft firewall
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
Firewall examines each ____________ that are entering or leaving the internal network.

A)emails users
B)updates
C)connections
D)data packets
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
A firewall protects which of the following attacks?

A)phishing
B)dumpster diving
C)denial of service (dos)
D)shoulder surfing
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
There are ______ types of firewall.

A)5
B)4
C)3
D)2
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
Packet filtering firewalls are deployed on ________

A)routers
B)switches
C)hubs
D)repeaters
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
In the ______________ layer of OSI model, packet filtering firewalls are implemented.

A)application layer
B)session layer
C)presentation layer
D)network layer
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
The __________ defines the packet filtering firewall rules.

A)access control list
B)protocols
C)policies
D)ports
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
ACL stands for _____________

A)access condition list
B)anti-control list
C)access control logs
D)access control list
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
When a packet does not fulfil the ACL criteria, the packet is _________

A)resend
B)dropped
C)destroyed
D)acknowledged as received
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.