Chapter 7 Flashcards
At what layer of the OSI model does the IPSec encryption protocol operate?
a. Transport layer b. Application layer c. Network layer d. Physical layer
c. Network layer
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
True
False
False
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
False
True
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
a. VPN transport b. VPN gateway c. VPN proxy d. VPN server
b. VPN gateway
Digital certificates are issued by organizations known as what term?
a. certification registrars b. certification authorities c. identity verifiers d. certificate exchanges
b. certification authorities
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
a. IaaS b. XaaS c. PaaS d. SaaS
d. SaaS
The combination of a public key and a private key are known by what term below?
a. key team b. key set c. key pair d. key tie
c. key pair
PPP can support several types of Network layer protocols that might use the connection.
True
False
True
What option below is not an encryption algorithm method that is used by SSH?
a. Kerberos b. SHA-2 c. RSA d. DES
b. SHA-2
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
a. MS-CHAPv2 b. EAP c. MS-CHAP d. TKIP
b. EAP
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
a. PPTP b. L2TP c. SSTP d. TTLS
c. SSTP
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
True
False
true
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
True
False
True
A SecurID key chain fob from RSA security generates a password that changes how often?
a. every 30 seconds b. every 70 seconds c. every 20 seconds d. every 60 seconds
d. every 60 seconds
How often should administrators and network users be required to change their password?
a. 90 days b. 60 days c. 120 days d. 180 days
b. 60 days
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
a. 128 bit b. 256 bit c. 512 bit d. 160 bit
b. 256 bit
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
a. Kerberos b. AES c. EAP d. TKIP
d.
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
a. priority b. encryption c. FCS d. FEC
c. FCS
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. (A) True (B) False
Answer : (A)
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
(A) True
(B) False
Answer : (B)
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
(A) True
(B) False
Answer : (B)
PPP can support several types of Network layer protocols that might use the connection.
(A) True
(B) False
Answer : (A)
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
(A) True
(B) False
Answer : (A)
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? (A) IaaS (B) PaaS (C) SaaS (D) XaaS
Answer : (A)
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? (A) IaaS
(B) SaaS
(C) XaaS
(D) PaaS
Answer : (B)
Which of the following is NOT an encryption algorithm used by SSH? (A) SHA-2 (B) DES (C) RSA (D) Kerberos
Answer : (A)
The SSH service listens on what TCP port? (A) 20 (B) 21 C) 22 (D) 23
Answer : (C)
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length? (A) 128 bit B) 160 bit (C) 256 bit (D) 512 bit
Answer : (B)
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? (A) MS-CHAP (B) MS-CHAPv2 (C) EAP (D) TKIP
Answer : (C)
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
(A) In an authorization file under your home directory on your computer.
(B) In an authorization file on the host where the SSH server is.
C) In the /etc/ssh/keys folder.
(D) In the /var/run/ssh/public folder.
Answer : (B)
What security principle provides proof of delivery and proof of the sender's identity? (A) utility (B) integrity (C) availability (D) non-repudiation
Answer : (D)
The combination of a public key and a private key are known by what term below? (A) key set (B) key team (C) key pair D) key tie
Answer : (C)
Digital certificates are issued by organizations known as what term? (A) certification authorities (B) certification registrars (C) identity verifiers (D) certificate exchanges
Answer : (A)
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? (A) L2TP (B) TLS (C) IPsec (D) SSL
Answer : (C)
At what layer of the OSI model does the IPsec encryption protocol operate? (A) Physical layer (B) Network layer (C) Transport layer (D) Application layer
Answer : (B)
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field? (A) priority (B) FCS C) FEC (D) encryption
Answer : (B)