Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Isabella is a network administrator. She is researching virtual private network (VPN) options for company employees who work from home. The solution must provide encryption

Isabella is a network administrator. She is researching virtual private network (VPN) options for company employees who work from home. The solution must provide encryption over public networks, including the Internet; not rely upon pathways the company owns; be reliable; and not be subject to eavesdropping. It must also be cost-effective. Which solution does she choose?

a) Channeled VPN

b) Hybrid VPN

c) Secured VPN

d) Trusted VPN

Otto is one of many employees working from home. Because his home is located in a rural area, the only form of connectivity available is dial-up. To connect to his office located in an urban community, what must the IT department set up?

a) Cable

b) DSL

c) Remote access server (RAS)

d) Virtual private network (VPN) server

Which of the following statements is TRUE of connections between a corporate local area network (LAN) and a remote client, such as a remote worker?

a) The corporate LAN connection is usually a temporary or nondedicated connection to the Internet.

b) The remote client connection is usually a dedicated link to the Internet.

c) The corporate LAN connection is always a circuit employing Multi-Protocol Label Switching (MPLS).

d) The remote client can have either a dedicated or a nondedicated connection to the Internet.

Diego is a network consultant. He is explaining the benefits of virtual private network (VPN) connections for remote clients to the owner of a company who wants to allow most staff to work remotely. He says that a VPN is both private and secure. What does he say is the rationale?

a) Authentication provides privacy and security.

b) Encryption provides privacy and security.

c) Authentication provides privacy and encryption provides security.

d) Encryption provides privacy and authentication provides security.

Montel is the newly hired IT administrator at a long-established company. In studying its IT infrastructure, he discovers that the main office is connected to four other branch offices in their large city, with each office being linked to the others by dedicated leased lines that allow for direct communications from one location to the next. This mesh network is used only by the company. Montel tells the company's CIO that he has discovered an issue with this design. Compared to a virtual private network (VPN), what main drawback does Montel report?

a) Access

b) Encryption

c) Expense

d) Privacy

Consuela is a business analyst for her company. She is working from home and on a video conference with several other team members. Her video-conferencing client displays a message indicating that the quality of her connection is unstable. What is the most likely problem?

a) Her computer's CPU is unable to process all of the data.

b) Her laptop has insufficient memory to sustain the connection.

c) Latency between her VPN client removing encryption and making it available to the video-conferencing client is causing poor performance.

d) VPNs over the Internet can easily suffer from latency, fragmentation, traffic congestion, and dropped packets.

Carl is a network technician who has been assigned to select a dedicated hardware device to act as the company's termination point for the secured virtual private network (VPN) tunnel. He chooses a device that allows the firewall to filter traffic that is exiting the VPN and moving into the local area network (LAN). It is the choice that is best suited for controlled access into the demilitarized zone (DMZ). What is the solution that he recommends?

a) Corporate firewall

b) Edge router

c) Software VPN

d) VPN appliance

Mazie is a network engineer designing a virtual private network (VPN) architecture. The architecture must have the ability to establish and maintain a secure link between the company's main office and a branch office over the Internet, effectively creating a single distributed LAN. What solution does she recommend be applied?

a) Extranet

b) Host-to-host

c) Remote access

d) Site-to-site

Which of the following is a virtual private network (VPN) encryption encapsulation method best suited for linking individual computers together, even though it does not encrypt the original IP header?

a) Cryptography

b) Ciphertext

c) Transport

d) Tunnel

Which of the following is an encryption method that is very fast and is based on a single, shared key?

a) Asymmetric

b) Ciphertext

c) Hashing

d) Symmetric

Asymmetric cryptography that uses key pairs is commonly known as:

a) public key cryptography.

b) private key cryptography.

c) single key cryptography.

d) Twofish key cryptography.

What is a mathematical operation that is easily performed but that is highly unlikely to reverse in a reasonable amount of time?

a) Dead-end function

b) One-way function

c) Digital key function

d) Key exchange function

A hashing cryptographic function takes the input of any file or message and creates a fixed length output based on:

a) the size of the message.

b) the type of encryption.

c) the hashing algorithm being used.

d) the level of security checksum required.

Which of the following establishes what a user can and cannot do relative to a virtual private network (VPN)?

a) Authentication

b) Authorization

c) Accessibility

d) Accounting

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions