Deck 7: Cloud Computing and Remote Access
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 7: Cloud Computing and Remote Access
1
What protocol below only provides the framework for authenticating clients and servers,but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
C
2
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
A)priority
B)FCS
C)FEC
D)encryption
A)priority
B)FCS
C)FEC
D)encryption
B
3
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
False
4
The combination of a public key and a private key are known by what term below?
A)key set
B)key team
C)key pair
D)key tie
A)key set
B)key team
C)key pair
D)key tie
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT an encryption algorithmused by SSH?
A)SHA-2
B)DES
C)RSA
D)Kerberos
A)SHA-2
B)DES
C)RSA
D)Kerberos
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What security principle provides proof of delivery and proof of the sender's identity?
A)utility
B)integrity
C)availability
D)non-repudiation
A)utility
B)integrity
C)availability
D)non-repudiation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?
A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?
A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
A)L2TP
B)TLS
C)IPsec
D)SSL
A)L2TP
B)TLS
C)IPsec
D)SSL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Digital certificates are issued by organizations known as what term?
A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?
A)128 bit
B)160 bit
C)256 bit
D)512 bit
A)128 bit
B)160 bit
C)256 bit
D)512 bit
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
PPP can support several types of Network layer protocols that might use the connection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Windows,UNIX,Linux,and Mac OS clients are all capable of connecting to a VPN usingPPTP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
At what layer of the OSI model does the IPsec encryption protocol operate?
A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?
A)IaaS
B)SaaS
C)XaaS
D)PaaS
A)IaaS
B)SaaS
C)XaaS
D)PaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The SSH service listens on what TCP port?
A)20
B)21
C)22
D)23
A)20
B)21
C)22
D)23
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which type of cloud service model involves hardware services that are provided virtually,including network infrastructure devices such as virtual servers?
A)IaaS
B)PaaS
C)SaaS
D)XaaS
A)IaaS
B)PaaS
C)SaaS
D)XaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
When PPP is used over an Ethernet network,it is known as ________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
A)Kerberos
B)TKIP
C)AES
D)EAP
A)Kerberos
B)TKIP
C)AES
D)EAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What authentication protocol sends authentication information in cleartext without encryption?
A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The key management phase of IPSec is reliant on which two services below?
A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
A)L2TP
B)PPTP
C)TTLS
D)SSTP
A)L2TP
B)PPTP
C)TTLS
D)SSTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What two key lengths are the most popular for the SHA-2 hashing algorithm?
A)160
B)256
C)512
D)1024
A)160
B)256
C)512
D)1024
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A _________________ is a service that is shared between multiple organizations,but not available publicly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What two options below are AAA services?
A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What two different types of encryption can be used by IPsec during data transfer?
A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
How often should administrators and network users be required to change their password?
A)60 days
B)90 days
C)120 days
D)180 days
A)60 days
B)90 days
C)120 days
D)180 days
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?
A)OpenVPN
B)SLIP
C)PPTP
D)PPP
A)OpenVPN
B)SLIP
C)PPTP
D)PPP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A SecurID key chain fob from RSA security generates a password that changes how often?
A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe how public key encryption works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe the three way handshake process as used by CHAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
How is GRE used by the PPP protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck