Network + Ch 7 RQ
All types of remote access techniques require some type of _________, which accepts a remote connection and grants privileges to the network's resources.
RTP
What kind of ticket is held by Kerberos' TGS?
TGT (Ticket-Granting Ticket)
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
port forwarding
What service in Windows Server 2012 R2 Authenticates remote users and computers to the windows domain and its corporate network resources?
remote access server (RAS)
EAPoL is primarily used with what kind of transmission?
wireless
What are the two primary encryption techniques used by VPN's today?
IPsec and SSL
Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?
PPTP uses TCP at the Transport layer L2TP uses UDP
Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a _________.
Private cloud
Which tunneling protocol is accepted and used by multiple vendors?
Unlike PPTP, L2TP is a standard accepted and used by multiple vendors.
Which encryption protocol does GRE use to increase the security of its transmissions?
GRE (generic Routing Encapsulation) uses IPsec for security when transmitting.
Which remote access protocol is used over an Ethernet network?
PPoE (PPP over Ethernet)
Which cloud computing service model gives software developers access to multiple operating systems for testing?
PaaS (Platform as a Service)
What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?
enables always -on remote connections while also allowing VPN connections to the network.
_________ is used for confidentiality while ________ is used for integrity and authentication.
rncryption and hassing
What is the minimum acceptable key size for today's security standards?
128-bit key size
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?
Brute force attack
When surfing online, you get some strange data on and apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?
Certificate authority (CA)
Which two protocols are available to secure transmissions for HTTP sessions?
SSL and TSL
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+
They both provide AAA (authentication, authorization, and accounting) not access control
In public key encryption, which key is used to decrypt the message?
the private key