Chapter 7 Flashcards
1
Q
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? A) IaaS B) PaaS C) SaaS D) XaaS
A
A) IaaS
2
Q
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? A) IaaS B) SaaS C) XaaS D) PaaS
A
B) SaaS
3
Q
Which of the following is NOT an encryption algorithm used by SSH? A) SHA-2 B) DES C) RSA D) Kerberos
A
A) SHA-2
4
Q
The SSH service listens on what TCP port? A) 20 B) 21 C) 22 D) 23
A
C) 22
5
Q
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length? A) 128 bit B) 160 bit C) 256 bit D) 512 bit
A
B) 160 bit
6
Q
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? A) MS-CHAP B) MS-CHAPv2 C) EAP D) TKIP
A
C) EAP
7
Q
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
A) in an authorization file under your home directory on your computer.
B) in an authorization file on the host where the SSH server is.
C) in the /etc/ssh/keys folder.
D) in the /var/run/ssh/public folder.
A
B) in an authorization file on the host where the SSH server is.
8
Q
What security principle provides proof of delivery and proof of the senders identity? A) utility B) integrity C) availability D) non-repudiation
A
D) non-repudiation
9
Q
The combination of a public key and a private key are known by what term below? A) key set B) key team C) key pair D) key tie
A
C) key pair
10
Q
Digital certificates are used by organizations known as what term below? A) certification authorities B) certification registrars C) identity verifiers D) certification exchanges
A
A) certification authorities
11
Q
What security encryption protocol requires regular reestablishment of a connection and can be used with any type of TCP/IP transmission? A) L2TP B) TLS C) IPsec D) SSL
A
C) IPsec
12
Q
At what layer of the OSI model does the IPsec encryption protocol operate? A) Physical layer B) Network layer C) Transport layer D) Application layer
A
B) Network layer
13
Q
The PPP headers and trailers used to create a PPP frame that encapsulates network layer packets vary between 8 and 10 fights in size due to what field? A) priority B) FCS C) FEC D) encryption
A
B) FCS
14
Q
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? A) VPN proxy B) VPN server C) VPN transport D) VPN gateway
A
D) VPN gateway
15
Q
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments? A) VMware vSphere B) Oracle VirtualBox C) Parallels D) Citrix Xen
A
D) Citrix Xen