When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? |
VPN gateway |
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol? |
TKIP |
A SecurID key chain fob from RSA security generates a password that changes how often? |
every 60 seconds |
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
The combination of a public key and a private key are known by what term below? |
Key pair |
How often should administrators and network users be required to change their password? |
60 days |
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol? |
TKIP |
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? |
IaaS |
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? |
SaaS |
When using public and private keys to connect to an SSH server, where must your public key be placed? |
In the authorized keys file on the host where the SSH server is. |
When using public and private keys to connect to an SSH server, where must your public key be placed? |
In the authorized keys file on the host where the SSH server is. |
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length? |
160 bit |
At what layer of the OSI model does the IPSec encryption protocol operate? |
Network Layer |
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol? |
TKIP |
The SSH service listens on what TCP port? |
22 |
How often should administrators and network users be required to change their password? |
60 days |
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
At what layer of the OSI model does the IPSec encryption protocol operate? |
Network layer |
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? |
SaaS |
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? |
VPN gateway |
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol? |
TKIP |
What protocol below is a Microsoft proprietary protocol first available in Windows Vista? |
SSTP |
The combination of a public key and a private key are known by what term below? |
key pair |
The SSH service listens on what TCP port? |
22 |
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
Digital certificates are issued by organizations known as what term? |
certification authorities |
At what layer of the OSI model does the IPSec encryption protocol operate? |
Network layer |
When using public and private keys to connect to an SSH server, where must your public key be placed? |
In the authorized keys file on the host where the SSH server is. |
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? |
IPSec |
The combination of a public key and a private key are known by what term below? |
key pair |
Digital certificates are issued by organizations known as what term? |
certification authorities |
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? |
IPSec |
Digital certificates are issued by organizations known as what term? |
certification authorities |
What security principle provides proof of delivery and proof of the sender’s identity? |
non-repudiation |
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? |
EAP |
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments? |
Citrix Xen |
Network + chapter 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price