Week 8
Which of the following is NOT a task that a VPN concentrator is responsible for?
A VPN concentrator shuts down established connections when malicious traffic occurs.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).
True
Office 365 is an example of an SaaS implementation with a subscription model.
True
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
False
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
False
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
False
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
At what layer of the OSI model does the IPsec encryption protocol operate?
Network layer
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH supports port forwarding.
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
Because public key encryption requires the use of two different keys, it is also known as which type of encryption?
asymmetric
The combination of a public key and a private key are known by what term below?
key pair
Why is the telnet utility a poor choice for remote access to a device?
It provides poor authentication and no encryption.
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
Trivial FTP (TFTP)
A Type 1 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
True
A community cloud is a service shared between multiple organizations, but not available publicly.
True
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway
Which of the following terms best describe a small file containing verified identification information about the user and the user's public key?
digital certificate
The use of certificate authorities to associate public keys with certain users is known by what term?
public-key infrastructure