Computer Networks-Chapter 7 Review Questions
Which two protocols are available to create secure transmissions for HTTP sessions?
SSL/TLS or TLS/SSL
What are the two primary encryption techniques used by VPNs today?
IPsec and SSL
Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?
PPTP uses TCP, L2TP uses UDP.
All types of remote access techniques require some type of _______________ , which accepts a remote connection and grants privileges to the network's resources.
RAS (Remote Access Service)
What kind of ticket is held by Kerberos' TGS?
a TGT (Ticket-Granting Ticket)
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using? a. Brute force attack b. Zero-day exploit c. CIA triad d. Endpoint security vulnerability
a. Brute force attack
Which remote access protocol is used over an Ethernet network? a. PPPoE b. RAS c. PPP d. SLIP
a. PPPoE
What is the minimum acceptable key size for today's security standards? a. 8 bytes b. 128 bits c. 256 bits d. 512 bits
b. 128 bits
Which tunneling protocol is accepted and used by multiple vendors? a. SSL VPN b. L2TP c. SSL d. SSH
b. L2TP
Which cloud computing service model gives software developers access to multiple operating systems for testing? a. IaaS b. PaaS c. SaaS d. XaaS
b. PaaS
In public key encryption, which key is used to decrypt the message? a. Session key b. Private key c. Public key d. Network key
b. Private key
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+? a. Authentication b. Authorization c. Access control d. Accounting
c. Access control
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources? a. Active Directory b. Group Policy c. DirectAccess d. RAS (Remote Access Service)
c. DirectAccess
Which encryption protocol does GRE use to increase the security of its transmissions? a. SSL b. SFTP c. IPsec d. SSH
c. IPsec
When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?
certificate authority (CA)
Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a ____________________.
community cloud
What feature must be configured on a router to redirect traffic from an insecure port to a secure one? a. AAA (authentication, authorization, and accounting) b. Mutual authentication c. TGS (Ticket-Granting Service) d. Port forwarding
d. Port forwarding
_____________ is used for confidentiality while _______________ is used for integrity and authentication.
encryption and hashing data
What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?
it enables always-on remote connections while also allowing VPN connections to the network.
EAPoL is primarily used with what kind of transmission?
802.1x