network + chapter 7 guide to networks 7th edition review questions
acounting, authentication, and authorization
What are the three AAA services provided by RADIUS and TACACS+?
ipsec and SSL
What are the two primary encryption techniques used by VPNs today?
port forwarding
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
128
What is the minimum acceptable key size for today's security standards?
wireless
EAPoL is primarily with what kind of transmission?
private key
In public key encryption, which key is used to decrypt the message?
community cloud
Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a _____
RAS (Remote Access Service)
What service in Windows Server 2012 R2 authenticates remote user and computers to the Windows domain and its corporate network resources?
TCP
Which Transport layer protocol does PPTP use?
PaaS
Which cloud computing service model gives software developers access to multiple operating systems for testing?
IPsec (Internet Protocol Security)
Which encryption protocol does GRE use to increase the security of its transmissions?
PPPoE (Point to Point Protocol over Ethernet)
Which remote access protocol is used over an Ethernet network?
L2TP (Layer 2 Tunneling Protocol)
Which tunneling protocol is accepted and used by multiple vendors?
brute force attack
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?
RAS (Remote Access Server)
All types of remote access techniques require some type of _______, which accepts a remote connection and grants privileges to the network's resources.