Network + Ch 7 RQ

Ace your homework & exams now with Quizwiz!

All types of remote access techniques require some type of _________, which accepts a remote connection and grants privileges to the network's resources.

RTP

What kind of ticket is held by Kerberos' TGS?

TGT (Ticket-Granting Ticket)

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

port forwarding

What service in Windows Server 2012 R2 Authenticates remote users and computers to the windows domain and its corporate network resources?

remote access server (RAS)

EAPoL is primarily used with what kind of transmission?

wireless

What are the two primary encryption techniques used by VPN's today?

IPsec and SSL

Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use?

PPTP uses TCP at the Transport layer L2TP uses UDP

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a _________.

Private cloud

Which tunneling protocol is accepted and used by multiple vendors?

Unlike PPTP, L2TP is a standard accepted and used by multiple vendors.

Which encryption protocol does GRE use to increase the security of its transmissions?

GRE (generic Routing Encapsulation) uses IPsec for security when transmitting.

Which remote access protocol is used over an Ethernet network?

PPoE (PPP over Ethernet)

Which cloud computing service model gives software developers access to multiple operating systems for testing?

PaaS (Platform as a Service)

What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?

enables always -on remote connections while also allowing VPN connections to the network.

_________ is used for confidentiality while ________ is used for integrity and authentication.

rncryption and hassing

What is the minimum acceptable key size for today's security standards?

128-bit key size

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?

Brute force attack

When surfing online, you get some strange data on and apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

Certificate authority (CA)

Which two protocols are available to secure transmissions for HTTP sessions?

SSL and TSL

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+

They both provide AAA (authentication, authorization, and accounting) not access control

In public key encryption, which key is used to decrypt the message?

the private key


Related study sets

Chapter 3 - Life Insurance Policies

View Set

Abnormal Psych Final Prep-Chapter 6

View Set

Chapter 16: Nursing Care of the Family During Labor and Birth

View Set

Positioning and Projections of the Wrist

View Set

Saunders Antepartum and intrapartum ( Maternity )

View Set