Network+ Guide to Networks 7th Edition Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?

160 bit

The SSH service listens on what TCP port?

22

How often should administrators and network users be required to change their password?

60 days

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Citrix Xen

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

EAP

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

True or False: After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

False

True or False: The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.

False

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPsec

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?

In an authorization file on the host where the SSH server is.

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

What authentication protocol sends authentication information in cleartext without encryption?

PAP

Which of the following is NOT an encryption algorithm used by SSH?

SHA-2

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

SSTP

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

TKIP

True or False: An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

True

True or False: PPP can support several types of Network layer protocols that might use the connection.

True

True or False: Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.

True

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

Digital certificates are issued by organizations known as what term?

certification authorities

A SecurID key chain fob from RSA security generates a password that changes how often?

every 60 seconds

The combination of a public key and a private key are known by what term below?

key pair

What security principle provides proof of delivery and proof of the sender's identity?

non-repudiation


Ensembles d'études connexes

energy, flow and nutrient cycling

View Set

UNIT 2 - CHAPTER 6 - UNDERSTANDING ROLE AND IMPORTANCE OF STAKEHOLDERS

View Set

S-190 Intro to Wildland Fire Behavior

View Set

Introduction to Operations Management

View Set

Chapter 33: Obstetrics and Neonatal Care

View Set

Chapter 2: Types of Life Policies

View Set

MAN Chapt 7, Chapt 3, Chapt 4, Test 2 Concept Cards, Ch. 7 Strategies for Competing in International Markets, Test 1 General Cards, Chapter 5. The Five Generic Competitive Strategies, Chapt 1, Test 1 General Cards (2), MAN Test 2 Concept Cards, Chapt...

View Set

Fall 21 Health & Illness Exam 1 Content

View Set

Geography 103 A TEST 2 (lecture content from 9/27)

View Set

Modules 1-3: Basic Network Connectivity and Communications

View Set