Question
Isabella is a network administrator. She is researching virtual private network (VPN) options for company employees who work from home. The solution must provide encryption
Isabella is a network administrator. She is researching virtual private network (VPN) options for company employees who work from home. The solution must provide encryption over public networks, including the Internet; not rely upon pathways the company owns; be reliable; and not be subject to eavesdropping. It must also be cost-effective. Which solution does she choose?
| a) Channeled VPN |
| b) Hybrid VPN |
| c) Secured VPN |
| d) Trusted VPN |
Otto is one of many employees working from home. Because his home is located in a rural area, the only form of connectivity available is dial-up. To connect to his office located in an urban community, what must the IT department set up?
| a) Cable |
| b) DSL |
| c) Remote access server (RAS) |
| d) Virtual private network (VPN) server |
Which of the following statements is TRUE of connections between a corporate local area network (LAN) and a remote client, such as a remote worker?
| a) The corporate LAN connection is usually a temporary or nondedicated connection to the Internet. |
| b) The remote client connection is usually a dedicated link to the Internet. |
| c) The corporate LAN connection is always a circuit employing Multi-Protocol Label Switching (MPLS). |
| d) The remote client can have either a dedicated or a nondedicated connection to the Internet. |
Diego is a network consultant. He is explaining the benefits of virtual private network (VPN) connections for remote clients to the owner of a company who wants to allow most staff to work remotely. He says that a VPN is both private and secure. What does he say is the rationale?
| a) Authentication provides privacy and security. |
| b) Encryption provides privacy and security. |
| c) Authentication provides privacy and encryption provides security. |
| d) Encryption provides privacy and authentication provides security. |
Montel is the newly hired IT administrator at a long-established company. In studying its IT infrastructure, he discovers that the main office is connected to four other branch offices in their large city, with each office being linked to the others by dedicated leased lines that allow for direct communications from one location to the next. This mesh network is used only by the company. Montel tells the company's CIO that he has discovered an issue with this design. Compared to a virtual private network (VPN), what main drawback does Montel report?
| a) Access |
| b) Encryption |
| c) Expense |
| d) Privacy |
Consuela is a business analyst for her company. She is working from home and on a video conference with several other team members. Her video-conferencing client displays a message indicating that the quality of her connection is unstable. What is the most likely problem?
| a) Her computer's CPU is unable to process all of the data. |
| b) Her laptop has insufficient memory to sustain the connection. |
| c) Latency between her VPN client removing encryption and making it available to the video-conferencing client is causing poor performance. |
| d) VPNs over the Internet can easily suffer from latency, fragmentation, traffic congestion, and dropped packets. |
Carl is a network technician who has been assigned to select a dedicated hardware device to act as the company's termination point for the secured virtual private network (VPN) tunnel. He chooses a device that allows the firewall to filter traffic that is exiting the VPN and moving into the local area network (LAN). It is the choice that is best suited for controlled access into the demilitarized zone (DMZ). What is the solution that he recommends?
| a) Corporate firewall |
| b) Edge router |
| c) Software VPN |
| d) VPN appliance |
Mazie is a network engineer designing a virtual private network (VPN) architecture. The architecture must have the ability to establish and maintain a secure link between the company's main office and a branch office over the Internet, effectively creating a single distributed LAN. What solution does she recommend be applied?
| a) Extranet |
| b) Host-to-host |
| c) Remote access |
| d) Site-to-site |
Which of the following is a virtual private network (VPN) encryption encapsulation method best suited for linking individual computers together, even though it does not encrypt the original IP header?
| a) Cryptography |
| b) Ciphertext |
| c) Transport |
| d) Tunnel |
Which of the following is an encryption method that is very fast and is based on a single, shared key?
| a) Asymmetric |
| b) Ciphertext |
| c) Hashing |
| d) Symmetric |
Asymmetric cryptography that uses key pairs is commonly known as:
| a) public key cryptography. |
| b) private key cryptography. |
| c) single key cryptography. |
| d) Twofish key cryptography. |
What is a mathematical operation that is easily performed but that is highly unlikely to reverse in a reasonable amount of time?
| a) Dead-end function |
| b) One-way function |
| c) Digital key function |
| d) Key exchange function |
A hashing cryptographic function takes the input of any file or message and creates a fixed length output based on:
| a) the size of the message. |
| b) the type of encryption. |
| c) the hashing algorithm being used. |
| d) the level of security checksum required. |
Which of the following establishes what a user can and cannot do relative to a virtual private network (VPN)?
| a) Authentication |
| b) Authorization |
| c) Accessibility |
| d) Accounting |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started