Network+Guide to Network,Chapter-7 Review Question
17. Which two protocols are available to create secure transmissions for HTTP sessions?
SSL and TLS
L2TP use?
TCP,UDP
and DirectAccess?
Always on remote connections
18. ________is used for confidentiality while_______ is used for integrity and
Authentication Encryption hashing
using?
Brute force attack
issues digital certificates?
Certificate Authority
20. What kind of ticket is held by Kerberos' TGS?
Ticket Granting service
requirements, or data access, might share resources in a
Community Cloud.
15. What are the two primary encryption techniques used by VPNs today?
IPsec and SSL
3. Which remote access protocol is used over an Ethernet network?
PPPoE
a secure one?
Port forwarding
8. In public key encryption, which key is used to decrypt the message?
Private key
19. EAPoL is primarily used with what kind of transmission?
Wireless
operating systems for testing?
b. PaaS
the Windows domain and its corporate network resources?
. DirectAccess
4. Which encryption protocol does GRE use to increase the security of its transmissions?
. IPsec
5. Which tunneling protocol is accepted and used by multiple vendors?
. L2TP
7. What is the minimum acceptable key size for today's security standards?
128 bits
TACACS+?
Access control