Computer Networks-Chapter 7 Review Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two protocols are available to create secure transmissions for HTTP sessions?

SSL/TLS or TLS/SSL

What are the two primary encryption techniques used by VPNs today?

IPsec and SSL

Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?

PPTP uses TCP, L2TP uses UDP.

All types of remote access techniques require some type of _______________ , which accepts a remote connection and grants privileges to the network's resources.

RAS (Remote Access Service)

What kind of ticket is held by Kerberos' TGS?

a TGT (Ticket-Granting Ticket)

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using? a. Brute force attack b. Zero-day exploit c. CIA triad d. Endpoint security vulnerability

a. Brute force attack

Which remote access protocol is used over an Ethernet network? a. PPPoE b. RAS c. PPP d. SLIP

a. PPPoE

What is the minimum acceptable key size for today's security standards? a. 8 bytes b. 128 bits c. 256 bits d. 512 bits

b. 128 bits

Which tunneling protocol is accepted and used by multiple vendors? a. SSL VPN b. L2TP c. SSL d. SSH

b. L2TP

Which cloud computing service model gives software developers access to multiple operating systems for testing? a. IaaS b. PaaS c. SaaS d. XaaS

b. PaaS

In public key encryption, which key is used to decrypt the message? a. Session key b. Private key c. Public key d. Network key

b. Private key

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+? a. Authentication b. Authorization c. Access control d. Accounting

c. Access control

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources? a. Active Directory b. Group Policy c. DirectAccess d. RAS (Remote Access Service)

c. DirectAccess

Which encryption protocol does GRE use to increase the security of its transmissions? a. SSL b. SFTP c. IPsec d. SSH

c. IPsec

When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

certificate authority (CA)

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a ____________________.

community cloud

What feature must be configured on a router to redirect traffic from an insecure port to a secure one? a. AAA (authentication, authorization, and accounting) b. Mutual authentication c. TGS (Ticket-Granting Service) d. Port forwarding

d. Port forwarding

_____________ is used for confidentiality while _______________ is used for integrity and authentication.

encryption and hashing data

What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?

it enables always-on remote connections while also allowing VPN connections to the network.

EAPoL is primarily used with what kind of transmission?

802.1x


Ensembles d'études connexes

Chapter 13: ICMP Chapter questions and end chapter QUIZ

View Set

Precalculus Sine, Cosine, Tangent Wheel

View Set

Personal Finance Chapter 8 Assessment

View Set

PrepU Chapter 15: Oncology: Nursing Management in Cancer Care

View Set

Chapter 61 Communication in the Dental Office Handout

View Set