Chapter 7 Flashcards

1
Q

At what layer of the OSI model does the IPSec encryption protocol operate?​

a. ​Transport layer
b. ​Application layer
c. ​Network layer
d. ​Physical layer
A

c. ​Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.​
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​

a. ​VPN transport
b. ​VPN gateway
c. ​VPN proxy
d. ​VPN server
A

b. ​VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital certificates are issued by organizations known as what term?​

a. ​certification registrars
b. ​certification authorities
c. ​identity verifiers
d. ​certificate exchanges
A

b. ​certification authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

a. ​IaaS
b. ​XaaS
c. ​PaaS
d. ​SaaS
A

d. ​SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The combination of a public key and a private key are known by what term below?

a. ​key team
b. ​key set
c. ​key pair
d. ​key tie
A

c. ​key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PPP can support several types of Network layer protocols that might use the connection.​

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What option below is not an encryption algorithm method that is used by SSH?

a. ​Kerberos
b. ​SHA-2
c. ​RSA
d. ​DES
A

b. ​SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

a. ​MS-CHAPv2
b. ​EAP
c. ​MS-CHAP
d. ​TKIP
A

b. ​EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?​

a. ​PPTP
b. ​L2TP
c. ​SSTP
d. ​TTLS
A

c. ​SSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
True
False

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.​
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A SecurID key chain fob from RSA security generates a password that changes how often?

a. ​every 30 seconds
b. ​every 70 seconds
c. ​every 20 seconds
d. ​every 60 seconds
A

d. ​every 60 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How often should administrators and network users be required to change their password?

a. 90 days
b. 60 days
c. ​120 days
d. ​180 days
A

b. 60 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?​

a. ​128 bit
b. ​256 bit
c. ​512 bit
d. ​160 bit
A

b. ​256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​

a. ​Kerberos
b. ​AES
c. ​EAP
d. ​TKIP
A

d.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​

a. priority​
b. ​encryption
c. ​FCS
d. ​FEC
A

c. ​FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. (A) True (B) False

A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.​
(A) True
(B) False

A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.​
(A) True
(B) False

A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PPP can support several types of Network layer protocols that might use the connection.​
(A) True
(B) False

A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

​Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
(A) True
(B) False

A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?​ 
(A) IaaS​
(B) ​PaaS 
(C) ​SaaS 
(D) ​XaaS
A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

​What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? (A) ​IaaS
(B) ​SaaS
(C) ​XaaS
(D) ​PaaS

A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
​Which of the following is NOT an encryption algorithm used by SSH? 
(A) ​SHA-2 
(B) ​DES 
(C) ​RSA 
(D) ​Kerberos
A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
​The SSH service listens on what TCP port? 
(A) ​20 
(B) ​21 
C) ​22 
(D) ​23
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and
used a hash of what length?​
 (A) ​128 bit 
B) ​160 bit 
(C) ​256 bit 
(D) ​512 bit
A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
​What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? 
(A) ​MS-CHAP 
(B) ​MS-CHAPv2 
(C) ​EAP 
(D) ​TKIP
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?​
(A) ​In an authorization file under your home directory on your computer.
(B) ​In an authorization file on the host where the SSH server is.
C) ​In the /etc/ssh/keys folder.
(D) ​In the /var/run/ssh/public folder.

A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
What security principle provides proof of delivery and proof of the sender's identity?​ 
(A) ​utility 
(B) ​integrity 
(C) ​availability 
(D) ​non-repudiation
A

Answer : (D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
​The combination of a public key and a private key are known by what term below?
(A) ​key set 
(B) ​key team 
(C) ​key pair 
D) ​key tie
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
Digital certificates are issued by organizations known as what term?​ 
(A) ​certification authorities 
(B) ​certification registrars 
(C) ​identity verifiers 
(D) ​certificate exchanges
A

Answer : (A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
​What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? 
(A) ​L2TP 
(B) ​TLS 
(C) ​IPsec 
(D) ​SSL
A

Answer : (C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
At what layer of the OSI model does the IPsec encryption protocol operate?​ 
(A) ​Physical layer 
(B) ​Network layer 
(C) ​Transport layer 
(D) ​Application layer
A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​ 
(A) priority​
(B) ​FCS 
C) ​FEC 
(D) ​encryption
A

Answer : (B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​ 
(A) ​VPN proxy
 (B) ​VPN server 
(C) ​VPN transport 
(D) ​VPN gateway
A

Answer : (D)

38
Q
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?​ 
(A) ​VMware vSphere 
B) ​Oracle VirtualBox 
C) ​Parallels 
(D) ​Citrix Xen
A

Answer : (D)

39
Q
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?​ 
(A) ​L2TP 
(B) ​PPTP 
(C) ​TTLS (
D) ​SSTP
A

Answer : (D)

40
Q
What authentication protocol sends authentication information in cleartext without encryption?​
(A) ​PAP 
B) ​MS-CHAP
(C) ​MS-CHAPv2 
D) ​EAP
A

Answer : (A)

41
Q
​How often should administrators and network users be required to change their password? 
(A) 60 days 
(B) 90 days 
(C) ​120 days 
(D) ​180 days
A

Answer : (A)

42
Q
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​ 
(A) ​Kerberos 
(B) ​TKIP 
(C) ​AES 
(D) ​EAP
A

Answer : (B)

43
Q
A SecurID key chain fob from RSA security generates a password that changes how often? 
(A) ​every 20 seconds
(B) ​every 30 seconds 
(C) ​every 60 seconds 
(D) ​every 70 seconds
A

Answer : (C)

44
Q

The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.

A

Answer : Platform as a Service (PaaS)

45
Q

A _________________ is a service that is shared between multiple organizations, but not available publicly.​

A

Answer : community cloud

46
Q

A variant of TLS is ___________________, which provides authentication like SSL/TLS, but does not require a certificate for each user.​

A

Answer : Tunneled Transport Layer Security (TTLS)

47
Q

In Kerberos, a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.

A

Answer : ticket

48
Q

When PPP is used over an Ethernet network, it is known as ________________.​Answer : PPPoE Answer : Point to Point over Ethernet

A

Answer : PPPoE Answer : Point to Point over Ethernet

49
Q

In which cloud computing service model are hardware services provided virtually, including network infrastructure devices such as virtual servers?

A

Answer: IaaS (Infrastructure as a Service)

50
Q

Which of the following cloud deployment models would the Internet be considered as an example?

a. Community
b. Private
c. Public
d. Hybrid

A

Answer: C

51
Q

A ______ is a virtual connection between a client and a remote network, two remote networks, or two remote hosts over the Internet, to remotely provide network resources.

A

Answer: virtual private network or VPN

52
Q

Which remote access protocol is an earlier protocol that does not support encryption, can carry only IP packets, and works strictly on serial connections?

A

Answer: SLIP or Serial Line Internet Protocol

53
Q

Most VPN tunneling protocols operate at the _____ layer to encapsulate the VPN frame into a Network packet.

A

Answer: Data Link

54
Q

Because public key encryption requires the use of two different keys, it is also known as _____ encryption.

A

Answer: asymmetric

55
Q

Which of the following terms best describe a small file containing verified identification information about the user and the user’s public key?

a. certificate authority
b. private key
c. digital certificate
d. cipher

A

Answer: C

56
Q

Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?

a. tunneling
b. handshake
c. VPN
d. file transfer

A

Answer: B

57
Q

SSH provides little security for establishing a connection and no security for transmitting data.

A

Answer: False

58
Q
Which cloud computing service model gives software developers access to multiple 
operating systems for testing? 
A. IaaS 
B. PaaS 
C. SaaS 
D. XaaS
A

Answer: B. PaaS

59
Q

What service in Windows Server 2012 R2 authenticates remote users and computers to the
Windows domain and its corporate network resources?
A. Active Directory
B. Group Policy
C. DirectAccess
D. RAS (Remote Access Service)

A

Answer: C. DirectAccess

60
Q
Which remote access protocol is used over an Ethernet network? 
A. PPPoE 
B. RAS 
C. PPP 
D. SLIP
A

Answer: A. PPPoE

61
Q
Which encryption protocol does GRE use to increase the security of its transmissions? 
A. SSL 
B. SFTP 
C. IPsec 
D. SSH
A

Answer: C. IPsec

62
Q
Which tunneling protocol is accepted and used by multiple vendors? 
A. SSL VPN 
B. L2TP 
C. SSL 
D. SSH
A

Answer: B. L2TP

63
Q

A hacker runs a program that tries numerous character combinations until it stumbles on the
correct combination and cracks the key. What offensive strategy is this program using?
A. Brute force attack
B. Zero-day exploit
C. CIA triad
D. Endpoint security vulnerability

A

Answer: A. Brute force attack

64
Q
What is the minimum acceptable key size for today’s security standards? 
A. 8 bytes 
B. 128 bits 
C. 256 bits 
D. 512 bits
A

Answer: B. 128 bits

65
Q
In public key encryption, which key is used to decrypt the message? 
A. Session key 
B. Private key 
C. Public key 
D. Network key
A

Answer: B. Private key

66
Q

What feature must be configured on a router to redirect traffic from an insecure port to a
secure one?
A. AAA (authentication, authorization, and accounting)
B. Mutual authentication
C. TGS (Ticket-Granting Service)
D. Port forwarding

A

Answer: D. Port forwarding

67
Q
Which of the following is NOT one of the three AAA services provided by RADIUS and 
TACACS+? 
A. Authentication 
B. Authorization 
C. Access control 
D. Accounting
A

Answer: C. Access control

68
Q

Organizations with common interests, such as regulatory requirements, performance
requirements, or data access, might share resources in a __________________.

A

Answer: community cloud

69
Q

All types of remote access techniques require some type of ________________, which
accepts a remote connection and grants privileges to the network’s resources.

A

Answer: remote access server (RAS)

70
Q

Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP
use?

A

Answer: TCP, UDP

71
Q

What unique VPN connection characteristic is provided by the conjunction of RRAS and
DirectAccess?

A

Answer: RRAS and DirectAccess together enable always-on remote connections.

72
Q

What are the two primary encryption techniques used by VPNs today?

A

Answer: IPsec and SSL

73
Q

When surfing online, you get some strange data on an apparently secure Web site, and you
realize you need to check the legitimacy of the site. What kind of organization issues digital
certificates?

A

Answer: Certificate authority (CA)

74
Q

Which two protocols are available to create secure transmissions for HTTP sessions?

A

Answer: SSL and TLS

75
Q

____________________ is used for confidentiality while ___________________ is used for
integrity and authentication.

A

Answer: Encryption, hashing

76
Q

EAPoL is primarily used with what kind of transmission?

A

Answer: Wireless

77
Q

What kind of ticket is held by Kerberos’ TGS?

A

Answer: Ticket-granting ticket (TGT)

78
Q

What does RAS stand for?

a. Remote authentication service
b. Remote access server
c. Remote accounting service
d. Remote addressing server

A

b. Remote access server

79
Q

Which of the following best describes a modem’s function?

a. To encapsulate Data Link layer protocols as Network layer protocols before transmitting data over the PSTN
b. To separate data into frames as it is transmitted from the computer to the PSTN, and then strip data from frames as it is received from the PSTN
c. To encrypt data as it is transmitted from the computer to the PSTN, and then decrypt data as it is received from the PSTN
d. To convert a source computer’s digital pulses into analog signals for the PSTN, and then convert analog signals back into digital pulses for the destination computer

A

d. To convert a source computer’s digital pulses into analog signals for the PSTN, and then convert analog signals back into digital pulses for the destination computer

80
Q

What is another common term for Public Switched Telephone Network?

a. Plain old telephone service
b. Basic rate telephone service
c. Limited access telephone service
d. Transcontinental public telephone service

A

a. Plain old telephone service

81
Q

Which of the following types of dial-up connections would result in the best performance from the client’s perspective?

a. A PPP dial-up connection to an RRAS server that allowed the client to launch an application from the RRAS server
b. A PPTP dial-up connection to an RRAS server that allowed the client to launch an application from another server on the LAN
c. A SLIP dial-up connection to an RRAS server that allowed the client to log on to an application server on the LAN and run an application from that application server
d. A PPTP dial-up connection to an RRAS server that allowed the client to log on to a Citrix terminal server and use ICA to run an application

A

d. A PPTP dial-up connection to an RRAS server that allowed the client to log on to a Citrix terminal server and use ICA to run an application

82
Q

Why do most remote clients (for example, those that dial in to an RRAS server) use DHCP and not static IP addressing?

a. Because using DHCP allows more efficient use of a limited number of IP addresses
b. Because using DHCP ensures that the client is authorized to access the network
c. Because using DHCP ensures that the client is assigned a valid IP address
d. Because using DHCP allows the client to use the same IP address each time he or she dials in to the LAN

A

c. Because using DHCP ensures that the client is assigned a valid IP address

83
Q

What does the “T” in PPTP stand for?

a. Tunneling
b. Transmission
c. Transport
d. Telecommunications

A

a. Tunneling

84
Q

What is one reason an organization might employ a VPN rather than simply allow users to dial directly in to their remote access server?

a. VPNs always provide better performance than direct-dial connections.
b. VPNs allow more users to connect to the LAN simultaneously.
c. VPNs are less expensive for connecting a large number of remote users.
d. VPNs prevent the need for firewalls between access servers and the Internet.

A

c. VPNs are less expensive for connecting a large number of remote users.

85
Q

In this lab, you connected a workstation to a server using a VPN. Which of the following is true about the VPN connection you created in this lab?

a. It uses physical IP addresses.
b. It uses virtual IP addresses on the workstation end.
c. It uses virtual IP addresses on both ends.
d. It requires a modem for connection

A

c. It uses virtual IP addresses on both ends.

86
Q

Which of the following transmission methods is most apt to be used by VPN clients?

a. PSTN
b. T-1
c. frame relay
d. SONET

A

a. PSTN

87
Q
What is the most common public network used with VPNs?
a. ARPANET 
What is the most common public network used with VPNs?
a. ARPANET 
b. The Internet 
c. NetBEUI 
d. AppleTalk 
c. NetBEUI 
d. AppleTalk
A

b. The Internet

88
Q

Which of the following are reasons you might implement Terminal Services instead of a remote access server? (Choose all that apply.)

a. No modems required with Terminal Services
b. Central configuration and control of applications on the Terminal Server
c. No modems required on clients
d. No need to configure security on the Terminal Server

A

a. No modems required with Terminal Services

89
Q

What is the difference between configuring a Windows Server 2012 R2 computer to accept Remote Desktop Connection and configuring it to run Terminal Services?

a. Remote Desktop Connection requires additional licensing.
b. Terminal Services requires each client to have a modem.
c. Terminal Services allows no more than two simultaneous connections.
d. Terminal Services allows more than two simultaneous connections

A

d. Terminal Services allows more than two simultaneous connections

90
Q

What is one way a network administrator can effectively troubleshoot a user’s problem in a Terminal Services session that can’t be done with a remote access server?

a. By speaking with the user over the phone
b. By examining the Terminal Server’s error logs
c. By taking over the user’s session temporarily
d. By rebooting the server

A

c. By taking over the user’s session temporarily

91
Q

Which of the following is a potential disadvantage of Terminal Services?

a. It requires additional licensing.
b. It requires the client to be running Windows 8.1
c. It requires the client to have a high-speed connection such as a T-1.
d. It requires the server to have a minimum of 1 GB of RAM.

A

a. It requires additional licensing.