Matching
Match the following terms to the appropriate definitions.
Premises:
Authentication developed for UNIX/Linux to provide authentication security
Adopted by the U.S. government to replace DES and 3DES
A multipurpose authentication method
Logon authentication compatible with all Windows operating systems
A module that can be installed in Linux without rewriting existing system code
Communications protocol that enables Internet connections to VPNs
Enables a user to encrypt the contents of a folder or a file
Used by Microsoft for remote communications over PPP or PPTP
Enables Linux and UNIX disk file systems and NFS files to be encrypted
Communications protocol that supports TCP/IP, NetBEUI, and IPX/SPX
Responses:
EFS
PPTP
EAP
SSH
MPPE
AES
CFS
PPP
PAM
NTLM
Correct Answer:
Premises:
Responses:
Authentication developed for UNIX/Linux to provide authentication security
Adopted by the U.S. government to replace DES and 3DES
A multipurpose authentication method
Logon authentication compatible with all Windows operating systems
A module that can be installed in Linux without rewriting existing system code
Communications protocol that enables Internet connections to VPNs
Enables a user to encrypt the contents of a folder or a file
Used by Microsoft for remote communications over PPP or PPTP
Enables Linux and UNIX disk file systems and NFS files to be encrypted
Communications protocol that supports TCP/IP, NetBEUI, and IPX/SPX
Premises:
Authentication developed for UNIX/Linux to provide authentication security
Adopted by the U.S. government to replace DES and 3DES
A multipurpose authentication method
Logon authentication compatible with all Windows operating systems
A module that can be installed in Linux without rewriting existing system code
Communications protocol that enables Internet connections to VPNs
Enables a user to encrypt the contents of a folder or a file
Used by Microsoft for remote communications over PPP or PPTP
Enables Linux and UNIX disk file systems and NFS files to be encrypted
Communications protocol that supports TCP/IP, NetBEUI, and IPX/SPX
Responses:
Related Questions
Q76: Does each security token have a unique
Q77: In a(n) _ attack every character combination
Q78: Was SSH developed by Netscape to provide
Q79: Does Microsoft's MPPE use a 40-bit RSA
Q80: List and provide the key lengths for
Q82: Which seven specific fields are contained in
Q83: List five common types of attacks on
Q84: List the six specific fields in the
Q85: List six applications that can be used
Q86: In Windows 2000 and Windows 2003, a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents