Chapter 7
True
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
Network layer
At what layer of the OSI model does the IPsec encryption protocol operate?
PAP
What authentication protocol sends authentication information in cleartext without encryption?
In an authorization file on the host where the SSH server is.
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
IaaS
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
60 days
How often should administrators and network users be required to change their password?
22
The SSH service listens on what TCP port?
SaaS
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SHA-2
Which of the following is NOT an encryption algorithm used by SSH?
True
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.