Cloud Computing And Remote Access
Which two protocols are available to create secure transmissions for HTTP sessions?
SSL and TLS
What unique VPN connection characteristics is provided by the conjunction of RAAS and Direct Access?
Always no remote connection
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is in this program using?
Brute Force Attack
What kind of ticket is held by Kerberos TGS?
Ticket-Granting Ticket (TGT)
When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?
Certificate Authority (CA)
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
Direct Access
What encryption does GRE use to increase the security of its transmission?
IPsec
What are two primary encryption techniques used by VPN today?
IPsec and SSL
Which tunneling protocol is accepted and used by multiple vendors?
L2TP
Which Transport layer protocol does PPTP use? Which Transport Layer does L2TP?
Layer 2 protocol/ Layer 2 Tunneling
_________is used for the confidentiality while _________ is used for integrity and authentication.
Non-repudiation, authenticity
Which remote is used over an ethernet network?
PPPoE
Which cloud computing service model gives software developers access to multiple operating systems for testing?
Paas (Platform As a Service)
What feature most must be configured on a router to redirect traffic from an insecure port to a secure one?
Port Forwarding
In public key encryption, which key is used to decrypt the message?
Private Key
EaPoL is primarily used with what kind of transmissions?
Wireless
Organization with common interest, such as regular requirements, performance requirements, or data access, might share resources in a__________________.
community cloud
All types of remote access techniques require some type of ______________, which accepts a remotes connections and grants privileges to the network's resources.
remote access server
What is the minimum acceptable key size for today's security standards?
128 bits
Which of the following is NOT one of the three AAA services provided by the RADIUS and TACACS+?
Access Control