Network+ Guide to Networks Chapter 7
DirectAccess
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and corporate network resources?
PaaS (Platform as a Service)
Which cloud computing service model gives software developers access to multiple operating systems for testing?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
PPPoE
Which remote access protocol is used over an Ethernet network?
L2TP
Which tunneling protocol is accepted and used by multiple vendors?
Brute force attack
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?