Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

True

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

Network layer

At what layer of the OSI model does the IPsec encryption protocol operate?​

PAP

What authentication protocol sends authentication information in cleartext without encryption?​

In an authorization file on the host where the SSH server is.

When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?​

IaaS

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?​

60 days

​How often should administrators and network users be required to change their password?

22

​The SSH service listens on what TCP port?

​SaaS

​What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SHA-2

​Which of the following is NOT an encryption algorithm used by SSH?

True

​Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.


Ensembles d'études connexes

Art Appreciation-Living With Art (Chapter 13)

View Set

The Tragedy of Julius Caesar Unit Test (84%)

View Set

AP Human Geography Unit 5 Review

View Set

Network topology and navigation devices review

View Set

Hazmat - Will Carry - Recognition of Undeclared Hazardous Materials

View Set

CHAPTER 5- HISTOLOGY STUDY AND REVIEW

View Set

Microbiology chapter 8: Mutations and HGT

View Set

Chapter 8- Vascular Access and Medication Administration

View Set