Encryption Flashcards

1
Q

Which of the following provides security for wireless networks?

– 802.11a
– CSMA/CD
– 802.3u
– WAP
– WPA2
A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer of security?

  • SMTP
  • HTTPS
  • DNS
  • SSH
A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols establishes a secure connection is encrypted data for VPN? (Select three)

  • RDP
  • FTP
  • L2TP
  • IPSec
  • PPTP
A
  • L2TP
  • IPSec
  • PPTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A VPN is used primarily for what purposes?

– Support the distribution of public web documents
– Allow remote systems to say the long-distance charges
– Support secure communications over in untrusted network
– Allow the user of the network attach printers

A

Support secure communications over in untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which solution would you choose?

  • EFS
  • Bitlocker
  • VPN
  • SPSec
A

-Bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following security solutions would prevent a user from reading a file which she did not create?

  • IPSec
  • Bitlocker
  • VPN
  • EFS
A

-EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following wireless security methods use a common shared key configured on the wireless access point and all wireless clients?

– WPA personal and WPA2 personal
– WEP, WPA personal, and WPA2 personal
– WEP
– WPA enterprise and WPA2 Enterprise
– WEP, WPA personal, WPA enterprise, WPA2 personal and WPA2 enterprise
A

WEP, WPA personal, and WPA2 personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly?

– ISDN
– Wireless
– DSL
– Dial-up
– Satellite
A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the phone security measures encrypt the entire contents of the hard drive?

– Chassis intrusion detection
– Hard disk password
– Trusted platform module
– Drive lock
– Bios password
A

Drive lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly