Final Exam - Chapter 13
The use of global user accounts can simplify user maintenance. A. True B. False
A
Which of the following protocols is used for encrypted traffic? A. HTTPS B. SNMP C. IP D. L2TP
A
Which of the following transmission techniques requires the entire bandwidth of a channel? A. Multiband B. Baseband C. Broadband D. Duplex
B
Which protocol does SNMP use to transport messages? A. TCP B. UDP C. TLS D. GRE
B
Which entity is responsible for controlling access to network traffic in the WAN? A. WAN optimizer B. Your organization C. WAN service provider D. Network management platform
C
Given adequate security controls, PDAs are appropriate for use as remote access devices. A. True B. False
A
All VPN traffic is encrypted. A. True B. False
B
The primary concern for remote access is availability. A. True B. False
B
Which of the following controls would best protect sensitive data disclosure to unauthorized users using remote computers? A. Encryption B. Strong passwords C. Firewalls D. Configuration management tools
B
Which of the following protocols works well with firewalls? A. GRE B. SSTP C. L2TP D. L2F
B
________ is a network protocol used to monitor network devices.
SNMP
________ is a technique that creates a virtual encrypted channel that allows applications to use any protocol to communicate with servers and services without having to worry about addressing privacy concerns.
Tunneling
Which of the following terms means the process to decide what a user can do? A. Identification B. Authentication C. Clearance D. Authorization
D
Which protocol is commonly used to protect data sent to Web browsers when not using VPNs? A. IPSec B. PPTP C. GRE D. TLS
D
________ is the primary security control used in the Remote Access Domain.
Encryption