Lab 13

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IPsec is implemented through two separate protocols. What are these protocols called?

AH and ESP Authentication Header and Encapsulation Security Payload

Which Security protocols use RSA encryptions to secure communications over an untrusted network? Pick 2. A. Internet Security Association and Key Management Protocol B. Transport Layer Security C. Point-to-Point Tunneling Protocol D. Secure Sockets layer

B. Transport Layer D. Secure Sockets Layer

SSH transfers data in clear text. True/False?

False. SSH uses public-key cryptography

Which of the following can route Layer 3 protocols across an IP network? -SSL -GRE -PPTP -IPsec

GRE

What protocol can encapsulate other LAN protocols and carry data securely over an IP network?

PPTP (Point-to-point Tunneling Protocol)

Which two protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet?

PPTP and L2TP (Point-to-Point Tunneling Protocol) and (Layer Two Tunneling Protocol)

To access the desktop of a remote computer or server, use a remote desktop protocol. What is Microsoft's protocol?

RDP (Remote Desktop Protocol)

Telnet is insecure because it transfers data in clear text and is easily intercepted. What is an acceptable alternative to Telnet?

SSH. (Secure Shell)

Which protocol does HTTPS use to offer greater security in Web transactions? A. IPsec B. SSL C. Kerberos D. Username and Password authentication

SSL - Secure Socket Layer HTTPS uses SSL to offer greater security during Web transactions.

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

NAT prevents the use of IPsec in most cases. T/F?

T. IPsec can't typically be used when static IP addresses are not used by both communication partners. NAT proxy performs network address translation on all communications.

Which two protocols are often added to other protocols to provide secure transmissions of data? TLS SMTP HTTPS SSL SNMP

TLS SSL

IPsec provides authentication and encryption services for IP based network traffic. T/F?

True

SSH allows for secure interactive control of remote systems. T/F?

True

SSL uses public-key cryptography. True/False?

True

Statement about SSL VPN. True or false? -Encrypts the entire communication session -Uses port 443 -Encapsulates packets by adding a GRE header.

True True False

Telnet transfers data in clear text. True/False?

True. It's not very secure.

Console port cannot be sniffed. True/False?

True. It's the most secure way to manage a routers configuration.

What is a hash?

a function that takes a variable length string (message) and compresses and transforms it into a fixed length variable. Ensures the data integrity of files and messages in transit. Sender and receiver use same hashing algorithm on the original data. If hashes match, data is unmodified. Hashes do not ensure confidentiality.


Ensembles d'études connexes

when was the constitution written

View Set

Chapter 61: Caring for Clients Requiring Orthopedic Treatment

View Set

Lifespan Development - Final Exam Review

View Set

E2 - Chapter 7 Linear Regression - BADM

View Set

Ch. 18 Iggy Care of Patients with Arthritis and Other Connective Tissue Diseases

View Set

In-group heterogeneity vs out-group homogeneity

View Set

Language Arts 700 - Unit 2: Usage; Speaking and Listening; Verb Tenses TEST: USAGE; SPEAKING AND LISTENING; VERB TENSESThe three intonations are juncture, pitch and

View Set

accounting 202 chapter 4 learnsmart

View Set

5.15.R - Lesson: Act 1 Quick Check

View Set

Spinal Cord Injury Study Questions

View Set