Chapter 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Brute force attack

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?

Citrix Xen

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?​

Network layer

At what layer of the OSI model does the IPSec encryption protocol operate?​

​certification authorities

Digital certificates are issued by organizations known as what term?​

Private key

In public key encryption, which key is used to decrypt the message?

​PAP

What authentication protocol sends authentication information in cleartext without encryption?​

every 60 seconds

​A SecurID key chain fob from RSA security generates a password that changes how often?

TKIP

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​

Port forwarding

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

SSTP

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?​

​non-repudiation

What security principle provides proof of delivery and proof of the sender's identity?​

DirectAccess

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

​VPN gateway

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​

​In the authorized keys file on the host where the SSH server is.

When using public and private keys to connect to an SSH server, where must your public key be placed?​

PaaS

Which cloud computing service model gives software developers access to multiple operating systems for testing?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

Access contro

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

PPPoE

Which remote access protocol is used over an Ethernet network?

L2TP

Which tunneling protocol is accepted and used by multiple vendors?

IaaS​

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?​

EAP

​What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

​IPSec

​What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

​FCS

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​

160 bit

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?​

128 bits

What is the minimum acceptable key size for today's security standards?

60 days

​How often should administrators and network users be required to change their password?

​key pair

​The combination of a public key and a private key are known by what term below?

SaaS

​What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SHA-2

​What option below is not an encryption algorithm method that is used by SSH?

​22

​What option below is not an encryption algorithm method that is used by SSH?


संबंधित स्टडी सेट्स

APK4125 Exercise Prescription Exam 1

View Set

Business Law Chapter 4 Study Guide

View Set

Human Development Chapter 6 Study Guide

View Set

Propedéutica médica Segundo Parcial

View Set

Physics 221 final multiple choice

View Set

Chapter 10: Democracy in America, 1815—1840

View Set

HESI EAQs - Renal, Urinary, and Reproductive Systems

View Set