13.7.6 Practice exams

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?

VPN concentrator

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?

VPN concentrator

A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database.
Because she rarely...
many of the things...
Which key step should you take when implementing this configurations? select two

Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two

L2TP PPTP

IPsec is implemented through two separate protocols. What are these protocols called? select two

AH ESP

Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?

IPsec

Which of the following statements about SSL VPN are true? select two

Uses port 443 Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network?

GRE

You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most cases?

NAT

13.7.6 Practice exams - Subjecto.com

13.7.6 Practice exams

Your page rank:

Total word count: 354
Pages: 1

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?

VPN concentrator

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?

VPN concentrator

A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database.
Because she rarely…
many of the things…
Which key step should you take when implementing this configurations? select two

Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose?

Support secured communications over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

Which of the following protocols can your portable computer use to connect to your company’s network via a virtual tunnel through the internet? select two

L2TP PPTP

IPsec is implemented through two separate protocols. What are these protocols called? select two

AH ESP

Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?

IPsec

Which of the following statements about SSL VPN are true? select two

Uses port 443 Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network?

GRE

You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most cases?

NAT

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending