Network + chapter 7 – Flashcards
Unlock all answers in this set
Unlock answersquestion
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
answer
VPN gateway
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
A SecurID key chain fob from RSA security generates a password that changes how often?
answer
every 60 seconds
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
The combination of a public key and a private key are known by what term below?
answer
Key pair
question
How often should administrators and network users be required to change their password?
answer
60 days
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
answer
IaaS
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
SaaS
question
When using public and private keys to connect to an SSH server, where must your public key be placed?
answer
In the authorized keys file on the host where the SSH server is.
question
When using public and private keys to connect to an SSH server, where must your public key be placed?
answer
In the authorized keys file on the host where the SSH server is.
question
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
answer
160 bit
question
At what layer of the OSI model does the IPSec encryption protocol operate?
answer
Network Layer
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
The SSH service listens on what TCP port?
answer
22
question
How often should administrators and network users be required to change their password?
answer
60 days
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
At what layer of the OSI model does the IPSec encryption protocol operate?
answer
Network layer
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
SaaS
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
answer
VPN gateway
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
answer
SSTP
question
The combination of a public key and a private key are known by what term below?
answer
key pair
question
The SSH service listens on what TCP port?
answer
22
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
Digital certificates are issued by organizations known as what term?
answer
certification authorities
question
At what layer of the OSI model does the IPSec encryption protocol operate?
answer
Network layer
question
When using public and private keys to connect to an SSH server, where must your public key be placed?
answer
In the authorized keys file on the host where the SSH server is.
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPSec
question
The combination of a public key and a private key are known by what term below?
answer
key pair
question
Digital certificates are issued by organizations known as what term?
answer
certification authorities
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPSec
question
Digital certificates are issued by organizations known as what term?
answer
certification authorities
question
What security principle provides proof of delivery and proof of the sender's identity?
answer
non-repudiation
question
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
answer
EAP
question
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
answer
Citrix Xen