decrypting, and checking packets? |
c. IPsec driver |
What are the two modes in which IPsec can be configured to run? |
b. tunnel and transport |
What was created to address the problem of remote clients not meeting an organization’s VPN security standards? |
a. VPN quarantine |
Which activity performed by VPNs encloses a packet within another packet? |
b. encapsulation |
Which IPsec component authenticates TCP/IP packets to ensure data integrity? |
a. AH |
Which of the following is a disadvantage of putting the VPN on a firewall? |
a. Internet and VPN traffic compete for resources |
Which of the following is a type of VPN connection? |
d. client-to-site |
Which of the following is an improvement of TLS over SSL? |
b. adds a hashed message authentication code |
Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate? |
a. security association |
Which of the following is NOT a factor a secure VPN design should address? |
c. nonrepudiation |
Which of the following is NOT an essential element of a VPN? |
d. authentication server |
Which of the following is NOT true about a hardware VPN? |
a. have more security vulnerabilities than software VPNs |
Which of the following is true about software VPNs? |
b. more cost-effective than hardware VPNs |
Which of the following is true about SSL? |
a. it uses sockets to communicate between client and server |
Which of the following is true about using VPNs? |
a. can use an existing broadband connection |
Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP? |
b. PPTP |
Which VPN protocol leverages Web-based applications? |
b. SSL |
Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication? |
a. L2TP |
Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet? |
c. IPsec |
Which VPN topology is also known as a hub-and-spoke configuration? |
a. star |
What feature of the 13 DNS root servers enables any group of servers to act as a root server? |
b. anycast addressing |
What is a zone transfer? |
c. updating a secondary DNS server |
What makes IP spoofing possible for computers on the Internet? |
b. the lack of authentication |
What type of attack displays false information masquerading as legitimate data? |
b. phishing |
What type of attack exploits a lack of bounds checking on the size of data stored in an array? |
a. buffer overflow |
What type of attack involves plaintext scripting that affects databases? |
b. SQL injection |
What type of DNS configuration prevents internal zone information from being stored on an Internet-accessible server? |
a. split-DNS architecture |
What type of DNS server is authoritative for a specific domain? |
c. primary |
Which aspect of hardening a Windows Web server allows you to restrict access to the web server based on IP address? |
a. access control |
Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data? |
b. NAP |
Which of the following is a top-level digital certificate in the PKI chain? |
b. trust anchor |
Which of the following is NOT a recommended security setting for Apache Web servers? |
d. use the default standard Web page error messages |
Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes? |
d. use standard naming conventions |
Which of the following is true about the Internet? |
c. it was established in the mid-1960s |
Which variation on phishing modifies the user’s host file to redirect traffic? |
d. pharming |
OS Hardening SEC340 – Chapter 11 & 12
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price