Chapter 13 Security Filtering Flashcards
T/F L2TP resides at the Network layer of the OSI model ? 437
False
PPTP uses two protocols, what are they? 438
Point to point protocol and Generic routing encapsulation protocol
In the 90s, this VPN protocol was used vastly for Internet use and was the first to be supported by Microsoft? 438
Point to point tunneling protocol
PPTP is also placed at the same layer of the OSI model as L2TP. T/F 438
False. PPTP resides at the application layer
Since PPTP was a VPN that was used back in the 90s, what is the VPN standards that is used today in many businesses? 439
IPSec
T/F it’s obvious that IPSec runs at the network layer of the OSI Model.
True
IPSec works in two modes transport mode and tunneling mode. What does tunneling mode do? 440
Protects all traffic going through the tunnel
You are a admin at a company called Zeus A. You have received an important email from a neighboring business Zeus C. The person that sends the email had encrypted the email so that it could be shielded from rival business. You use a special formula to decode the email to its original form. What is this formula? 441
Key.
I am a random group of strings of characters that is used in conjunction with the encryption algorithm. What am I ? 441
Encryption key
T/F encryption key comes in three ways public, private and and local
False. only private and public
You send a encrypted data to your neighboring business. Both you and your receiver has the same encryption key. This key style is known as what? 442
Symmetrical encryption
What are the three encryption standards used in the late 1977 to our modern day? 442
DES, 3DES, AES
You are a member of the Military working on a document that is deemed classified. After the document have been completed, you have chosen to use the AES encryption standard for better security when transferring the file to another base. What will be the adequate amount of bit key you would use to encode this file? 443
192-256 bit key
If having the same encryption key equals symmetrical, then having different encryption keys at each end point makes it a ? 442
Asymmetrical or public key
What security protocol will be a great tool to connect two non TCP/IP networks via the Internet? 437
L2TP