Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network+ Guide Study Set 2
Quiz 7: Cloud Computing and Remote Access
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
When PPP is used over an Ethernet network,it is known as ________________.
Question 22
Multiple Choice
Matching Match each correct item with the statement below. -In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
Question 23
Multiple Choice
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
Question 24
Multiple Choice
What authentication protocol sends authentication information in cleartext without encryption?
Question 25
Multiple Choice
The key management phase of IPSec is reliant on which two services below?
Question 26
Multiple Choice
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
Question 27
Multiple Choice
Matching Match each correct item with the statement below. -One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
Question 28
Multiple Choice
What two key lengths are the most popular for the SHA-2 hashing algorithm?
Question 29
Short Answer
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
Question 30
Short Answer
A _________________ is a service that is shared between multiple organizations,but not available publicly.
Question 31
Multiple Choice
Matching Match each correct item with the statement below. -A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
Question 32
Multiple Choice
What two options below are AAA services?
Question 33
Multiple Choice
What two different types of encryption can be used by IPsec during data transfer?
Question 34
Multiple Choice
How often should administrators and network users be required to change their password?
Question 35
Multiple Choice
Matching Match each correct item with the statement below. -A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
Question 36
Short Answer
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
Question 37
Short Answer
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
Question 38
Multiple Choice
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?