Chapter 7
Brute force attack
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?
Citrix Xen
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Network layer
At what layer of the OSI model does the IPSec encryption protocol operate?
certification authorities
Digital certificates are issued by organizations known as what term?
Private key
In public key encryption, which key is used to decrypt the message?
PAP
What authentication protocol sends authentication information in cleartext without encryption?
every 60 seconds
A SecurID key chain fob from RSA security generates a password that changes how often?
TKIP
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
Port forwarding
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
SSTP
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
non-repudiation
What security principle provides proof of delivery and proof of the sender's identity?
DirectAccess
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
VPN gateway
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
In the authorized keys file on the host where the SSH server is.
When using public and private keys to connect to an SSH server, where must your public key be placed?
PaaS
Which cloud computing service model gives software developers access to multiple operating systems for testing?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
Access contro
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?
PPPoE
Which remote access protocol is used over an Ethernet network?
L2TP
Which tunneling protocol is accepted and used by multiple vendors?
IaaS
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
EAP
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
IPSec
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
FCS
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
160 bit
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
128 bits
What is the minimum acceptable key size for today's security standards?
60 days
How often should administrators and network users be required to change their password?
key pair
The combination of a public key and a private key are known by what term below?
SaaS
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SHA-2
What option below is not an encryption algorithm method that is used by SSH?
22
What option below is not an encryption algorithm method that is used by SSH?