Which of the following is a disadvantage of putting the VPN on a firewall? |
Internet and VPN traffic compete for resources |
Which of the following is an improvement of TLS over SSL? |
adds a hashed message authentication code |
Which of the following is a type of VPN connection? |
client-to-site |
Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate? |
security association |
Which of the following is NOT a factor a secure VPN design should address? |
authentication server |
Which of the following is NOT true about a hardware VPN? |
have more security vulnerabilities than software VPNs |
Which of the following is true about software VPNs? |
more cost-effective than hardware VPNs |
Which of the following is true about SSL? |
it uses sockets to communicate between client and server |
Which of the following is true about using VPNs? |
can use an existing broadband connection |
Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP? |
PPTP |
Which VPN protocol leverages Web-based applications? |
SSL |
hich VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication? |
L2TP |
Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet? |
star |
CISS 320 Chapter 11
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price