Deck 9: Secure Wireless Transmissions

ملء الشاشة (f)
exit full mode
سؤال
SSH can even be used as a tool for secure network backups.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In a ____ VPN, multiple sites can connect to other sites over the Internet.

A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
سؤال
____ is a set of protocols developed to support the secure exchange of packets.

A) IPsec
B) UDP
C) HTTP
D) FTP
سؤال
The ____ is a protocol used to manage networked equipment.

A) PPTP
B) SNMP
C) FTP
D) L2TP
سؤال
____ key cryptography uses a single key to both encrypt and decrypt the document.

A) User
B) Private
C) Public
D) Known
سؤال
A ____ VPN is a user-to-LAN connection used by remote users.

A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
سؤال
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

A) LCP
B) PPPoE
C) L2TP
D) IPsec
سؤال
L2TP is only supported by Windows 2000 versions and higher.
سؤال
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
سؤال
The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
سؤال
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP
B) SFTP
C) SCP
D) SSH
سؤال
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
سؤال
The ____ allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
سؤال
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.

A) SNMPv3
B) SSH
C) IPsec
D) GPG
سؤال
The Linux operating system comes with a native cryptography system installed.
سؤال
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
سؤال
____ is a facility for transferring files securely.

A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
سؤال
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
سؤال
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.

A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
سؤال
____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
سؤال
How can a user access FTP?
سؤال
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.

A) passthrough
B) concentrator
C) built-in
D) PPTP
سؤال
In IPsec, key management is accomplished through a protocol known as ____.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
سؤال
The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
سؤال
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
سؤال
IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.

A) tube
B) tunnel
C) transport
D) lane
سؤال
Why is IPsec considered a transparent protocol?
سؤال
What are the drawbacks of using public key and private key encryption for transmitting documents?
سؤال
What are the main problems with private key cryptography?
سؤال
Briefly describe how SNMP works.
سؤال
An enhanced feature of SSH is known as port forwarding, also called ____________________.
سؤال
A VPN ____ aggregates hundreds or thousands of multiple connections together.

A) endpoint
B) tunnel
C) protocol
D) concentrator
سؤال
How does SSH port forwarding work?
سؤال
In IPsec, authentication is accomplished by the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
سؤال
A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
سؤال
In IPsec, confidentiality is achieved through the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
سؤال
____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
سؤال
How does SCP work?
سؤال
Briefly describe how PGP (or GPG) works.
سؤال
What are some of the advantages of VPN technology?
سؤال
What are the areas of protection provided by IPsec?
سؤال
Match between columns
most widely deployed tunneling protocol.
SSH
most widely deployed tunneling protocol.
Layer 4-7 device
most widely deployed tunneling protocol.
IPsec tunnel mode
most widely deployed tunneling protocol.
HTTPS
most widely deployed tunneling protocol.
Endpoint
most widely deployed tunneling protocol.
VPN Client
most widely deployed tunneling protocol.
PPTP
most widely deployed tunneling protocol.
CFS
most widely deployed tunneling protocol.
Secure FTP (SFTP)
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
SSH
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Layer 4-7 device
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
IPsec tunnel mode
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Endpoint
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
PPTP
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
CFS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Secure FTP (SFTP)
encrypts both the header and the data portion.
SSH
encrypts both the header and the data portion.
Layer 4-7 device
encrypts both the header and the data portion.
IPsec tunnel mode
encrypts both the header and the data portion.
HTTPS
encrypts both the header and the data portion.
Endpoint
encrypts both the header and the data portion.
VPN Client
encrypts both the header and the data portion.
PPTP
encrypts both the header and the data portion.
CFS
encrypts both the header and the data portion.
Secure FTP (SFTP)
one of the ways to reduce the risk of FTP attack.
SSH
one of the ways to reduce the risk of FTP attack.
Layer 4-7 device
one of the ways to reduce the risk of FTP attack.
IPsec tunnel mode
one of the ways to reduce the risk of FTP attack.
HTTPS
one of the ways to reduce the risk of FTP attack.
Endpoint
one of the ways to reduce the risk of FTP attack.
VPN Client
one of the ways to reduce the risk of FTP attack.
PPTP
one of the ways to reduce the risk of FTP attack.
CFS
one of the ways to reduce the risk of FTP attack.
Secure FTP (SFTP)
encrypts all files or selected directories and files on a Linux system.
SSH
encrypts all files or selected directories and files on a Linux system.
Layer 4-7 device
encrypts all files or selected directories and files on a Linux system.
IPsec tunnel mode
encrypts all files or selected directories and files on a Linux system.
HTTPS
encrypts all files or selected directories and files on a Linux system.
Endpoint
encrypts all files or selected directories and files on a Linux system.
VPN Client
encrypts all files or selected directories and files on a Linux system.
PPTP
encrypts all files or selected directories and files on a Linux system.
CFS
encrypts all files or selected directories and files on a Linux system.
Secure FTP (SFTP)
the end of the tunnel between VPN devices.
SSH
the end of the tunnel between VPN devices.
Layer 4-7 device
the end of the tunnel between VPN devices.
IPsec tunnel mode
the end of the tunnel between VPN devices.
HTTPS
the end of the tunnel between VPN devices.
Endpoint
the end of the tunnel between VPN devices.
VPN Client
the end of the tunnel between VPN devices.
PPTP
the end of the tunnel between VPN devices.
CFS
the end of the tunnel between VPN devices.
Secure FTP (SFTP)
UNIX-based command interface and protocol for securely accessing a remote computer.
SSH
UNIX-based command interface and protocol for securely accessing a remote computer.
Layer 4-7 device
UNIX-based command interface and protocol for securely accessing a remote computer.
IPsec tunnel mode
UNIX-based command interface and protocol for securely accessing a remote computer.
HTTPS
UNIX-based command interface and protocol for securely accessing a remote computer.
Endpoint
UNIX-based command interface and protocol for securely accessing a remote computer.
VPN Client
UNIX-based command interface and protocol for securely accessing a remote computer.
PPTP
UNIX-based command interface and protocol for securely accessing a remote computer.
CFS
UNIX-based command interface and protocol for securely accessing a remote computer.
Secure FTP (SFTP)
"plain" HTTP sent over SSL/TLS.
SSH
"plain" HTTP sent over SSL/TLS.
Layer 4-7 device
"plain" HTTP sent over SSL/TLS.
IPsec tunnel mode
"plain" HTTP sent over SSL/TLS.
HTTPS
"plain" HTTP sent over SSL/TLS.
Endpoint
"plain" HTTP sent over SSL/TLS.
VPN Client
"plain" HTTP sent over SSL/TLS.
PPTP
"plain" HTTP sent over SSL/TLS.
CFS
"plain" HTTP sent over SSL/TLS.
Secure FTP (SFTP)
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
SSH
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Layer 4-7 device
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
IPsec tunnel mode
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
HTTPS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Endpoint
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
VPN Client
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
PPTP
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
CFS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Secure FTP (SFTP)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Secure Wireless Transmissions
1
SSH can even be used as a tool for secure network backups.
True
2
In a ____ VPN, multiple sites can connect to other sites over the Internet.

A) point-to-point
B) person-to-person
C) remote-access
D) site-to-site
D
3
____ is a set of protocols developed to support the secure exchange of packets.

A) IPsec
B) UDP
C) HTTP
D) FTP
A
4
The ____ is a protocol used to manage networked equipment.

A) PPTP
B) SNMP
C) FTP
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ key cryptography uses a single key to both encrypt and decrypt the document.

A) User
B) Private
C) Public
D) Known
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ VPN is a user-to-LAN connection used by remote users.

A) site-to-multipoint
B) site-to-site
C) remote-access
D) multipoint-to-multipoint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is software that works with a computer's network interface card adapter to simulate a dial-up session and can assign IP addresses as necessary.

A) LCP
B) PPPoE
C) L2TP
D) IPsec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
L2TP is only supported by Windows 2000 versions and higher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Cisco is probably the best-known hardware-based VPN and many of their routers are designed specifically for VPNs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ____ ensures that a connection is private by using data encryption; it also ensures that the connection is reliable.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ is a widely used protocol for establishing connections over a serial line or dial-up connection between two points.

A) PPP
B) SFTP
C) SCP
D) SSH
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Endpoints that provide passthrough VPN capability does not require that a separate VPN client application be installed on each device that connects to a VPN server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ____ allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted.

A) TLS Record Protocol
B) Secure FTP
C) TLS Handshake Protocol
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is similar to PGP and runs on Windows, UNIX, and Linux operating systems.

A) SNMPv3
B) SSH
C) IPsec
D) GPG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Linux operating system comes with a native cryptography system installed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
An extension to PPTP is the ____, which establishes, configures, and automatically tests the connection.

A) network access server (NAS)
B) Layer 2 Tunneling Protocol (L2TP)
C) IP Security (IPsec)
D) Link Control Protocol (LCP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
____ is a facility for transferring files securely.

A) L2TP
B) PPTP
C) PPP
D) Secure Copy (SCP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Transferring files was most commonly performed by using the ____, which is part of the TCP/IP suite.

A) Secure Shell (SSH)
B) IP Security (IPsec)
C) File Transfer Protocol (FTP)
D) Layer 2 Tunneling Protocol (L2TP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ is a protocol developed by Netscape for securely transmitting documents over the Internet.

A) Secure Sockets Layer (SSL)
B) Secure FTP (SFTP)
C) Secure Shell (SSH)
D) IP Security (IPsec)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ is a protocol that guarantees privacy and data integrity between applications communicating over the Internet.

A) Hypertext Transfer Protocol (HTTP)
B) Transport Layer Security (TLS)
C) File Transfer Protocol (FTP)
D) User Datagram Packet (UDP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
How can a user access FTP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Hardware devices that have a ____ VPN endpoint handle all the VPN tunnel setup, encapsulation, and encryption in the endpoint.

A) passthrough
B) concentrator
C) built-in
D) PPTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
In IPsec, key management is accomplished through a protocol known as ____.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
The most widely used public cryptography system for encrypting e-mail messages on Windows systems is a commercial product called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The most widely used SCP client is the command-line program ____________________, which is provided in many implementations of SSH.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
IPsec ____ mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted.

A) tube
B) tunnel
C) transport
D) lane
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Why is IPsec considered a transparent protocol?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are the drawbacks of using public key and private key encryption for transmitting documents?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are the main problems with private key cryptography?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Briefly describe how SNMP works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
An enhanced feature of SSH is known as port forwarding, also called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
A VPN ____ aggregates hundreds or thousands of multiple connections together.

A) endpoint
B) tunnel
C) protocol
D) concentrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
How does SSH port forwarding work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
In IPsec, authentication is accomplished by the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) ____________________ uses an unsecured public network, such as a hotspot WLAN or the Internet, as if it were a secure private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
In IPsec, confidentiality is achieved through the ____ protocol.

A) Encapsulating Security Payload (ESP)
B) ISAKMP/Oakley
C) Authentication Header (AH)
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
____________________ represents a merging of the features of PPTP with Cisco's Layer 2 Forwarding Protocol (L2F).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
How does SCP work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Briefly describe how PGP (or GPG) works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are some of the advantages of VPN technology?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the areas of protection provided by IPsec?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
most widely deployed tunneling protocol.
SSH
most widely deployed tunneling protocol.
Layer 4-7 device
most widely deployed tunneling protocol.
IPsec tunnel mode
most widely deployed tunneling protocol.
HTTPS
most widely deployed tunneling protocol.
Endpoint
most widely deployed tunneling protocol.
VPN Client
most widely deployed tunneling protocol.
PPTP
most widely deployed tunneling protocol.
CFS
most widely deployed tunneling protocol.
Secure FTP (SFTP)
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
SSH
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Layer 4-7 device
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
IPsec tunnel mode
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
HTTPS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Endpoint
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
VPN Client
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
PPTP
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
CFS
handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
Secure FTP (SFTP)
encrypts both the header and the data portion.
SSH
encrypts both the header and the data portion.
Layer 4-7 device
encrypts both the header and the data portion.
IPsec tunnel mode
encrypts both the header and the data portion.
HTTPS
encrypts both the header and the data portion.
Endpoint
encrypts both the header and the data portion.
VPN Client
encrypts both the header and the data portion.
PPTP
encrypts both the header and the data portion.
CFS
encrypts both the header and the data portion.
Secure FTP (SFTP)
one of the ways to reduce the risk of FTP attack.
SSH
one of the ways to reduce the risk of FTP attack.
Layer 4-7 device
one of the ways to reduce the risk of FTP attack.
IPsec tunnel mode
one of the ways to reduce the risk of FTP attack.
HTTPS
one of the ways to reduce the risk of FTP attack.
Endpoint
one of the ways to reduce the risk of FTP attack.
VPN Client
one of the ways to reduce the risk of FTP attack.
PPTP
one of the ways to reduce the risk of FTP attack.
CFS
one of the ways to reduce the risk of FTP attack.
Secure FTP (SFTP)
encrypts all files or selected directories and files on a Linux system.
SSH
encrypts all files or selected directories and files on a Linux system.
Layer 4-7 device
encrypts all files or selected directories and files on a Linux system.
IPsec tunnel mode
encrypts all files or selected directories and files on a Linux system.
HTTPS
encrypts all files or selected directories and files on a Linux system.
Endpoint
encrypts all files or selected directories and files on a Linux system.
VPN Client
encrypts all files or selected directories and files on a Linux system.
PPTP
encrypts all files or selected directories and files on a Linux system.
CFS
encrypts all files or selected directories and files on a Linux system.
Secure FTP (SFTP)
the end of the tunnel between VPN devices.
SSH
the end of the tunnel between VPN devices.
Layer 4-7 device
the end of the tunnel between VPN devices.
IPsec tunnel mode
the end of the tunnel between VPN devices.
HTTPS
the end of the tunnel between VPN devices.
Endpoint
the end of the tunnel between VPN devices.
VPN Client
the end of the tunnel between VPN devices.
PPTP
the end of the tunnel between VPN devices.
CFS
the end of the tunnel between VPN devices.
Secure FTP (SFTP)
UNIX-based command interface and protocol for securely accessing a remote computer.
SSH
UNIX-based command interface and protocol for securely accessing a remote computer.
Layer 4-7 device
UNIX-based command interface and protocol for securely accessing a remote computer.
IPsec tunnel mode
UNIX-based command interface and protocol for securely accessing a remote computer.
HTTPS
UNIX-based command interface and protocol for securely accessing a remote computer.
Endpoint
UNIX-based command interface and protocol for securely accessing a remote computer.
VPN Client
UNIX-based command interface and protocol for securely accessing a remote computer.
PPTP
UNIX-based command interface and protocol for securely accessing a remote computer.
CFS
UNIX-based command interface and protocol for securely accessing a remote computer.
Secure FTP (SFTP)
"plain" HTTP sent over SSL/TLS.
SSH
"plain" HTTP sent over SSL/TLS.
Layer 4-7 device
"plain" HTTP sent over SSL/TLS.
IPsec tunnel mode
"plain" HTTP sent over SSL/TLS.
HTTPS
"plain" HTTP sent over SSL/TLS.
Endpoint
"plain" HTTP sent over SSL/TLS.
VPN Client
"plain" HTTP sent over SSL/TLS.
PPTP
"plain" HTTP sent over SSL/TLS.
CFS
"plain" HTTP sent over SSL/TLS.
Secure FTP (SFTP)
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
SSH
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Layer 4-7 device
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
IPsec tunnel mode
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
HTTPS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Endpoint
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
VPN Client
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
PPTP
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
CFS
can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
Secure FTP (SFTP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.