Cloud Computing And Remote Access

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two protocols are available to create secure transmissions for HTTP sessions?

SSL and TLS

What unique VPN connection characteristics is provided by the conjunction of RAAS and Direct Access?

Always no remote connection

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is in this program using?

Brute Force Attack

What kind of ticket is held by Kerberos TGS?

Ticket-Granting Ticket (TGT)

When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

Certificate Authority (CA)

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

Direct Access

What encryption does GRE use to increase the security of its transmission?

IPsec

What are two primary encryption techniques used by VPN today?

IPsec and SSL

Which tunneling protocol is accepted and used by multiple vendors?

L2TP

Which Transport layer protocol does PPTP use? Which Transport Layer does L2TP?

Layer 2 protocol/ Layer 2 Tunneling

_________is used for the confidentiality while _________ is used for integrity and authentication.

Non-repudiation, authenticity

Which remote is used over an ethernet network?

PPPoE

Which cloud computing service model gives software developers access to multiple operating systems for testing?

Paas (Platform As a Service)

What feature most must be configured on a router to redirect traffic from an insecure port to a secure one?

Port Forwarding

In public key encryption, which key is used to decrypt the message?

Private Key

EaPoL is primarily used with what kind of transmissions?

Wireless

Organization with common interest, such as regular requirements, performance requirements, or data access, might share resources in a__________________.

community cloud

All types of remote access techniques require some type of ______________, which accepts a remotes connections and grants privileges to the network's resources.

remote access server

What is the minimum acceptable key size for today's security standards?

128 bits

Which of the following is NOT one of the three AAA services provided by the RADIUS and TACACS+?

Access Control


Ensembles d'études connexes

Chapter 16: The Progressive Era and Expansionism

View Set

Chapter 12: Building Successful Teams

View Set

chapter 14 - engaging customers and communicating customer value: integrated marketing communications strategy

View Set

Chapter 9: market segmentation, targeting, and positioning

View Set

prepu Ch. 65: Assessment of Neurologic Function

View Set

Solicitation / Accomplice liability

View Set

12.4 Nervous Tissue: Glial Cells

View Set