Filters
Question type

Study Flashcards

When PPP is used over an Ethernet network,it is known as ________________.

Correct Answer

verifed

verified

PPPoE
Poin...

View Answer

Matching Match each correct item with the statement below. -A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) PPP (Point to Point Protocol)
E) IKE (Internet Key Exchange)
F) AH (Authentication Header)
G) ESP (Encapsulating Security Payload)
H) CHAP (Challenge Handshake Authentication Protocol)
I) TKIP (Temporal Key Integrity Protocol)
J) KDC (Key Distribution Center) KDC)

K) E) and G)
L) E) and F)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -An encryption keygeneration and management scheme used by 802.11i.


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) PPP (Point to Point Protocol)
E) IKE (Internet Key Exchange)
F) AH (Authentication Header)
G) ESP (Encapsulating Security Payload)
H) CHAP (Challenge Handshake Authentication Protocol)
I) TKIP (Temporal Key Integrity Protocol)
J) KDC (Key Distribution Center) KDC)

K) D) and J)
L) E) and J)

Correct Answer

verifed

verified

At what layer of the OSI model does the IPsec encryption protocol operate?


A) Physical layer
B) Network layer
C) Transport layer
D) Application layer

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The key management phase of IPSec is reliant on which two services below?


A) Internet Key Exchange (IKE)
B) Internet Security Association and Key Management Protocol (ISAKMP)
C) Authentication Header (AH)
D) Encapsulating Security Payload (ESP)

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) PPP (Point to Point Protocol)
E) IKE (Internet Key Exchange)
F) AH (Authentication Header)
G) ESP (Encapsulating Security Payload)
H) CHAP (Challenge Handshake Authentication Protocol)
I) TKIP (Temporal Key Integrity Protocol)
J) KDC (Key Distribution Center) KDC)

K) H) and J)
L) E) and G)

Correct Answer

verifed

verified

H

When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?


A) VPN proxy
B) VPN server
C) VPN transport
D) VPN gateway

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

D

PPP can support several types of Network layer protocols that might use the connection.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT an encryption algorithmused by SSH?


A) SHA-2
B) DES
C) RSA
D) Kerberos

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.

A) True
B) False

Correct Answer

verifed

verified

Digital certificates are issued by organizations known as what term?


A) certification authorities
B) certification registrars
C) identity verifiers
D) certificate exchanges

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

How is GRE used by the PPP protocol?

Correct Answer

verifed

verified

After PPTP establishes the VPN tunnel,GR...

View Answer

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?


A) L2TP
B) PPTP
C) TTLS
D) SSTP

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

What security principle provides proof of delivery and proof of the sender's identity?


A) utility
B) integrity
C) availability
D) non-repudiation

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

D

Matching Match each correct item with the statement below. -One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) PPP (Point to Point Protocol)
E) IKE (Internet Key Exchange)
F) AH (Authentication Header)
G) ESP (Encapsulating Security Payload)
H) CHAP (Challenge Handshake Authentication Protocol)
I) TKIP (Temporal Key Integrity Protocol)
J) KDC (Key Distribution Center) KDC)

K) B) and F)
L) C) and H)

Correct Answer

verifed

verified

Matching Match each correct item with the statement below. -A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) PPP (Point to Point Protocol)
E) IKE (Internet Key Exchange)
F) AH (Authentication Header)
G) ESP (Encapsulating Security Payload)
H) CHAP (Challenge Handshake Authentication Protocol)
I) TKIP (Temporal Key Integrity Protocol)
J) KDC (Key Distribution Center) KDC)

K) C) and J)
L) C) and E)

Correct Answer

verifed

verified

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?


A) priority
B) FCS
C) FEC
D) encryption

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What two different types of encryption can be used by IPsec during data transfer?


A) Secure Sockets Layer (SSL)
B) Authentication Header (AH)
C) Encapsulating Security Payload (ESP)
D) Advanced Encryption Standard (AES)

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What two key lengths are the most popular for the SHA-2 hashing algorithm?


A) 160
B) 256
C) 512
D) 1024

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?


A) Kerberos
B) TKIP
C) AES
D) EAP

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer