Filters
Question type

Study Flashcards

Which of the following is true about SSL?


A) it uses shared-key encryption only
B) it uses sockets to communicate between client and server
C) it operates at the Data Link layer
D) it uses IPsec to provide authentication

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which VPN topology is also known as a hub-and-spoke configuration?


A) bus
B) partial mesh
C) star
D) full mesh

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a type of VPN connection?


A) site-to-server
B) client-to-site
C) server-to-client
D) remote gateway

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

IPsec has become the standard set of protocols for VPN security.

A) True
B) False

Correct Answer

verifed

verified

What is an advantage of Kerberos authentication with respect to password security? Explain.

Correct Answer

verifed

verified

A major advantage of Kerberos is that pa...

View Answer

Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate?


A) pairing
B) security association
C) internet key exchange
D) tunnel

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

MATCHING -an IPsec-related protocol that enables two computers to agree on security settings and establish a Security Association so that they can use Internet Key Exchange


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) B) and I)
L) All of the above

Correct Answer

verifed

verified

Describe a mesh VPN topology.What are advantages and disadvantages?

Correct Answer

verifed

verified

In a mesh configuration,all participants...

View Answer

MATCHING -a set of standard procedures that the IETF developed for enabling secure communication on the Internet


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

K) A) and F)
L) A) and C)

Correct Answer

verifed

verified

Which activity performed by VPNs encloses a packet within another packet?


A) address translation
B) encryption
C) authentication
D) encapsulation

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer