Network+Guide to Network,Chapter-7 Review Question

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

17. Which two protocols are available to create secure transmissions for HTTP sessions?

SSL and TLS

L2TP use?

TCP,UDP

and DirectAccess?

Always on remote connections

18. ________is used for confidentiality while_______ is used for integrity and

Authentication Encryption hashing

using?

Brute force attack

issues digital certificates?

Certificate Authority

20. What kind of ticket is held by Kerberos' TGS?

Ticket Granting service

requirements, or data access, might share resources in a

Community Cloud.

15. What are the two primary encryption techniques used by VPNs today?

IPsec and SSL

3. Which remote access protocol is used over an Ethernet network?

PPPoE

a secure one?

Port forwarding

8. In public key encryption, which key is used to decrypt the message?

Private key

19. EAPoL is primarily used with what kind of transmission?

Wireless

operating systems for testing?

b. PaaS

the Windows domain and its corporate network resources?

. DirectAccess

4. Which encryption protocol does GRE use to increase the security of its transmissions?

. IPsec

5. Which tunneling protocol is accepted and used by multiple vendors?

. L2TP

7. What is the minimum acceptable key size for today's security standards?

128 bits

TACACS+?

Access control


Ensembles d'études connexes

CCNA1 FINAL EXAM STUDY GUIDE part4

View Set

FIN3403- Chapter 5: Q.1, 2, 3, 4, 7 and Key Terms

View Set

Chapter 12 Business Organizations FINA 2244

View Set

CSP 031A C++ Programming I Midterm

View Set

Slope Formula, Missing Coordinate, Zeros

View Set

Family Centered Care-During Illness/Hospital 19

View Set