Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following provides integrity protection for packet headers and data and can optionally provide replay protection and access protection? a) Triple Data Encryption

Which of the following provides integrity protection for packet headers and data and can optionally provide replay protection and access protection?

a) Triple Data Encryption Standard (3DES)

b) Authentication Header (AH)

c) Encapsulating Security Payload (ESP)

d) Internet Key Exchange (IKE)

Chris is a network engineer deploying a virtual private network (VPN) solution. He needs an implementation of Secure Sockets Layer/Transport Layer Security (SSL/TLS) that adds a layer of authentication to the access. What feature does he require?

a) Advanced Encryption Standard (AES)

b) Bidirectional authentication

c) Identity services

d) One-way authentication

Which of the following statements is TRUE of an Internet Protocol Security (IPSec) virtual private network (VPN) when compared to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) VPN?

a) It requires client software.

b) It is typically less expensive.

c) It offers more client flexibility.

d) It requires fewer firewall rules.

Which of the following is a protocol that replaces the use of telnet and rlogin to log in to a shell on a remote host?

a) Authentication Header (AH)

b) Encapsulating Security Payload (ESP)

c) Layer 2 Tunneling Protocol (L2TP)

d) Secure Shell (SSH)

Mei is a new network technician for a mid-sized company. She is trying to determine what is causing a performance lag on the infrastructure's virtual private network (VPN). The lags typically occur between 8 a.m. and 9 a.m., and again between 1 p.m. and 2 p.m. What is the most likely cause?

a) Bandwidth

b) Client configuration

c) Encryption

d) Peak usage loads

The configuration, location, software version, and underlying operating system of a virtual private network (VPN) are all factors that are most likely to affect:

a) bandwidth.

b) tunneling.

c) security.

d) stability.

The IT department of a company has just rolled out a virtual private network (VPN) solution that offers greater flexibility, delegation of management, and added security over the previous implementation. What is this solution called?

a) Desktop virtualization

b) Operating system virtualization

c) Small office/home office (SOHO) virtualization

d) Secure Sockets Layer (SSL) virtualization

Oscar is deploying a virtual private network (VPN) solution for his company. The VPN needs to connect to remote servers by their Internet Protocol (IP) addresses rather than using network address translation (NAT). What type of VPN is Oscar deploying?

a) Customer premise equipment (CPE)

b) Hardware VPN

c) Operating system (OS)

d) Internet Protocol Security (IPSec)

Tonya is an accountant working from home. She connects to her office each day over a virtual private network (VPN). The IT department for her company has deployed a VPN appliance to assist employees such as Tonya in performing their tasks remotely. What solution does Tonya use to access her files on the company's accounting server?

a) Do it yourself (DIY)

b) Demilitarized zone (DMZ)

c) Gateway-to-gateway

d) Host-to-gateway

Alice is a network engineer who has been tasked with researching a virtual private network (VPN) tunneling protocol to be used by her company. It must be able to pass traffic through a network address translation (NAT) server and be compatible with a number of well-known proprietary and open source platforms. What solution does she select?

a) Internet Key Exchange v2 (IKEv2)

b) Layer 2 Tunneling Protocol (L2TP)

c) Transport Layer Security (TLS)

d) Point-to-Point Tunneling Protocol (PPTP)

Jacob is a remote employee. He clicks the Start menu button in Windows and selects an application to run. Most of the time, he is unaware that he is really accessing the application on a server at his company's main office several miles away. What solution is he using?

a) Hosted services

b) RD RemoteApp

c) RD Web Access

d) SSL NAT Transversal

Isabelle is a network engineer deploying an IT infrastructure in one of her company's new branch offices. Currently, she is designing a local subnetwork that contains and exposes the office's external services to a larger, untrusted network, specifically the Internet. What is this called?

a) Demilitarized zone (DMZ)

b) Extranet

c) Intranet

d) Virtual private network (VPN)

Carl is a student in a computer networking class who is studying virtual private network (VPN) implementations. He is learning the basics about VPNs. Which of the following statements does he find is TRUE?

a) VPNs are primarily hardware solutions.

b) VPNs are primarily software solutions.

c) VPNs are both hardware and software solutions.

d) VPNs are network address translation (NAT) solutions.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Database Management

Authors: Jeff Hoffer, Ramesh Venkataraman, Heikki Topi

13th Edition Global Edition

1292263350, 978-1292263359

More Books

Students also viewed these Databases questions

Question

Explain how to reward individual and team performance.

Answered: 1 week ago