Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Guide to Network Security
Quiz 5: Network Authentication and Remote Access Using Vpn
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -A hardware device specially designed to terminate VPNs and join multiple LANs.
Question 22
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Generally less expensive than hardware systems, and they tend to scale better on fast-growing networks.
Question 23
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Used when a dial-up user needs to establish a VPN connection with your network.
Question 24
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Rapidly becoming the protocol of choice for VPN connections of all sorts and should be used when the other protocols are not acceptable.
Question 25
Multiple Choice
Which term refers to two connections over a VPN line?
Question 26
Short Answer
The generally accepted definition of ____________________ refers to guessing, breaking, and/or stealing passwords to gain access to a system or application.
Question 27
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Used when a dial-up user has an old system that doesn't support L2TP and needs to use PPP to establish a VPN connection to your network.
Question 28
Short Answer
Match each item with a statement below. a.Site-to-site VPN f.PPTP b.Client-to-site VPN g.L2TP c.VPN appliance h.Mesh configuration d.Software VPN i.Hub-and-spoke configuration e.IPSec/IKE -Links two or more networks.
Question 29
Short Answer
A TCP/IP ____________________ is a channel or pathway over a packet network used by the VPN.
Question 30
Short Answer
A(n) ____________________ is basically an internal network restricted to employees within the organization, also using Internet technologies.
Question 31
Multiple Choice
IPSec ____ use a complex set of security protocols to protect information, including Internet Key Exchange (IKE) , which provides for the exchange of security keys between the machines in the VPN.