Filters
Question type

Study Flashcards

Which of the following is an improvement of TLS over SSL?


A) requires less processing power
B) uses a single hashing algorithm for all the data
C) uses only asymmetric encryption
D) adds a hashed message authentication code

Correct Answer

verifed

verified

MATCHING -Kerberos component that holds secret keys for users,applications,services,or resources


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

Correct Answer

verifed

verified

List two reasons IPsec has become the standard set of protocols for VPN security.

Correct Answer

verifed

verified

IPsec works at Layer 3 and provides a ty...

View Answer

Briefly describe the L2TP protocol.

Correct Answer

verifed

verified

Layer 2 Tunneling Protocol (L2TP)is base...

View Answer

What four events occur when one IPsec-compliant computer connects to another?

Correct Answer

verifed

verified

1.The IPsec driver and ISAKMP retrieve t...

View Answer

Define virtual private network.

Correct Answer

verifed

verified

A virtual private network (VPN)provides ...

View Answer

What was created to address the problem of remote clients not meeting an organization's VPN security standards?


A) split tunneling
B) VPN quarantine
C) IPsec filters
D) GRE isolation

Correct Answer

verifed

verified

The Internet Key ______________ protocol enables computers to make an SA.

Correct Answer

verifed

verified

While the AH ensures data integrity,confidentiality of data is provided by the __________ component of IPsec.

Correct Answer

verifed

verified

ESP
encaps...

View Answer

Which VPN protocol leverages Web-based applications?


A) PPTP
B) L2TP
C) SSL
D) IPsec

Correct Answer

verifed

verified

Standards and protocols used in VPNs are in their infancy and seldom used.

Correct Answer

verifed

verified

Which of the following is NOT true about a hardware VPN?


A) should be the first choice for fast-growing networks
B) can handle more traffic than software VPNs
C) have more security vulnerabilities than software VPNs
D) create a gateway-to-gateway VPN

Correct Answer

verifed

verified

Another name for a VPN connection is tunnel.

Correct Answer

verifed

verified

List four standard VPN protocols.

Correct Answer

verifed

verified

IPsec
PPTP...

View Answer

MATCHING -a form of key exchange used to encrypt and decrypt data as it passes through a VPN tunnel


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

Correct Answer

verifed

verified

TLS splits the input data in half and recombines it using a(n)___________ function.

Correct Answer

verifed

verified

Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet?


A) PPTP
B) L2TP
C) IPsec
D) SSL

Correct Answer

verifed

verified

MATCHING -an IPsec protocol that provides authentication of TCP/IP packets to ensure data integrity


A) AH
B) ESP
C) GRE
D) IKE
E) IPsec
F) ISAKMP
G) Kerberos
H) KDC
I) SSL
J) TGT

Correct Answer

verifed

verified

Which IPsec component authenticates TCP/IP packets to ensure data integrity?


A) AH
B) ESP
C) IKE
D) ISAKMP

Correct Answer

verifed

verified

_________________ based VPNs are appropriate when the endpoints are controlled by different organizations and network administrators.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer