Chapter 13 Security Filtering Flashcards

1
Q

T/F L2TP resides at the Network layer of the OSI model ? 437

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PPTP uses two protocols, what are they? 438

A

Point to point protocol and Generic routing encapsulation protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the 90s, this VPN protocol was used vastly for Internet use and was the first to be supported by Microsoft? 438

A

Point to point tunneling protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PPTP is also placed at the same layer of the OSI model as L2TP. T/F 438

A

False. PPTP resides at the application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Since PPTP was a VPN that was used back in the 90s, what is the VPN standards that is used today in many businesses? 439

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F it’s obvious that IPSec runs at the network layer of the OSI Model.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPSec works in two modes transport mode and tunneling mode. What does tunneling mode do? 440

A

Protects all traffic going through the tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are a admin at a company called Zeus A. You have received an important email from a neighboring business Zeus C. The person that sends the email had encrypted the email so that it could be shielded from rival business. You use a special formula to decode the email to its original form. What is this formula? 441

A

Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

I am a random group of strings of characters that is used in conjunction with the encryption algorithm. What am I ? 441

A

Encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F encryption key comes in three ways public, private and and local

A

False. only private and public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You send a encrypted data to your neighboring business. Both you and your receiver has the same encryption key. This key style is known as what? 442

A

Symmetrical encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three encryption standards used in the late 1977 to our modern day? 442

A

DES, 3DES, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are a member of the Military working on a document that is deemed classified. After the document have been completed, you have chosen to use the AES encryption standard for better security when transferring the file to another base. What will be the adequate amount of bit key you would use to encode this file? 443

A

192-256 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If having the same encryption key equals symmetrical, then having different encryption keys at each end point makes it a ? 442

A

Asymmetrical or public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What security protocol will be a great tool to connect two non TCP/IP networks via the Internet? 437

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly