The two different types of encryption used in EAP are TLS and PEAP
Topics:
View Entire Sample
Download Sample
Text preview
question
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.? T/F
answer
False
question
"What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?"
a">answer
EAP
question
What two different types of encryption can be used by IPsec during data transfer?
answer
Encapsulating Security Payload (ESP) Authentication Header (AH)
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude o
View entire sample
Join StudyHippo to see entire essay
different operating systems and devices?
answer
SaaS
question
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
answer
SSTP
question
How often should administrators and network users be required to change their password?
answer
60 days
question
What two key lengths are the most popular for the SHA-2 hashing algorithm?
answer
256, 512
question
The MD5 hashing algorithm is not susceptible to the
possibility of hash collisions.
answer
False
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
answer
False
question
PPP can support several types of Network layer protocols that might use the connection.
answer
True
question
class="flashcard__q">A SecurID key chain fob from RSA security generates a password that changes how often?
answer
every 60 seconds
question
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
answer
True
question
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
answer
IaaS
question
The key management phase of IPsec is reliant on which two services below?
answer
Internet Security Association and Key Management Protocol (ISAKMP), Internet Key Exchange (IKE)
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
answer
FCS
question
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
answer
True
question
Digital certificates are issued by organizations known as what term?
answer
certification authorities
question
The combination of a public key and a private key are known by what term below?
answer
key pair
question
Which of the following is NOT an encryption algorithm used by SSH?
answer
SHA-2
question
What two options below are AAA services?
answer
TACACS+ RADIUS
question
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
answer
In an
authorization file on the host where the SSH server is.
question
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
answer
160 bit
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPsec
question
What security principle provides proof of delivery and proof of the sender's identity?
answer
non-repudiation
question
At what layer of the OSI
model does the IPsec encryption protocol operate?
answer
Network layer
question
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
answer
SLIP, PPP
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
answer
VPN gateway
question
PPP can support several types of Network layer protocols that might use the connection
answer
True
question
A service model in which hardware services are provided virtually, including network infrastructure devices such as virtual servers.
answer
IaaS Infrastructure as a Service
question
A service model in which applications are provided through an online user interface and are compatible with a multitude of devices and operating systems.
answer
SaaS Software as a Service
question
In the contest of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques. In add, it also encrypts the entire IP packed for added security.
answer
ESP Encapsulating Security Payload
question
An authentication protocol that operates over PPP and also encrypts usernames and passwords for transmission.
answer
CHAP Challenge Handshake Authentication
question
One of two services in the key management phase of creating a secure IPsec connection. It negotiates the exchange of keys, including authentication of the keys. It uses UDP and usually runs on port 500
answer
IKE Internet Key Exchange
question
An encryption key generation and management scheme used by 802.11i
answer
TKIP Temporal Key Integrity Protocol
question
A service model in which various platforms are provide virtually, enabling developer s to build and test application within virtual, online environments tailored to the specific needs of a project.
answer
PaaS
question
In Kerberos terminology, the server that issues keys to clients during initial client authentication.
answer
KDC Key Distribution Center KDC
question
A Layer 2 communications protocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL. It can support multiple Network layer protocols and can encrypt transmissions.
answer
TKIP Temporal Key Integrity Protocol
question
In the context of IPsec, a type of encryption that provides authentication of the IP packet's data payload through public key techniques
answer
KDC (Key Distribution Center) KDC)
question
A _________________ is a service that is shared between multiple organizations, but not available publicly.
answer
Community Cloud
question
Describe how public key encryption works.?
answer
data is encrypted using two keys, one known to the user and the other is public key associated with the user
question
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
answer
SSTP
question
What are the three tenets of the CIA triad, and how do they provide assurances that data will be protected?
answer
Utility - data arrives in a format that is useful to the receiver Authenticity- data received is the data that was issued by the stated sender and not forged Non-repudiation- provides proof of delivery and proof of the sender's identity
question
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.? T/F
answer
False
question
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments??
answer
Citrix Xen
question
When using public and private keys to connect to an SSH server, where must your public key be placed?
answer
?In the authorized keys file on the host where the SSH server is.
question
What security principle provides proof of delivery and proof of the sender's identity??
answer
non-repudiation
question
When PPP is used over an Ethernet network, it is known as ________________.?
answer
PPoE
question
Describe the TLS/SSL handshake process as initiated by a web client accessing ?a secure website.
answer
it allows the client and server to introduce themselves to each other and establishes terms for how they will securely exchange data.
question
The _________________ cloud service model provides virtual environments online
that can be tailored to the needs of developers.
answer
PAS Platform as a service
question
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
answer
FCS
question
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length??
answer
160
question
What two key lengths are the most popular for the SHA-2 hashing algorithm??
answer
256 and 512
question
The combination of a public key and a private key are known by what term below
answer
Key Pair
question
PPP can support several types of Network layer protocols that might use the connection.? T/F
answer
True
question
?What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
answer
EAP
question
The SSH service listens on what TCP port?
answer
22
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
SaaS
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
answer
TKIP
question
?What option below is not an encryption algorithm method that is used by SSH?
answer
SHA-2
question
At what layer of the OSI model does the IPSec encryption protocol operate??
answer
Network layer 4
question
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
answer
SLIP
question
The key management phase of IPSec is reliant on which two services below?
answer
Internet Security Association and Key Management Protocol (ISAKMP) ?Internet Key Exchange (IKE)
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPSec
question
How is GRE used by the PPP protocol
answer
it encapuslates PPP frames them take on the temporary id of IP packets at layer 3
question
Describe the three way handshake process as used by CHAP
answer
the server sends the client a randomly generated string of characters. The client sends a new string inresponse to theserver while the server concatenates the users password with a challenge and created it own string.
question
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. T?F
answer
True
question
class="flashcard__q">What two different types of encryption can be used by IPSec during data transfer?
answer
Authentication Header (AH) and Encapsulating Security Payload (ESP)
question
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP. T/F
answer
True
question
In Kerberos, a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
answer
Ticket
question
A variant of TLS is ___________________, which provides authentication like SSL/TLS, but does not require a certificate for each user.?
answer
Tunneled Transport Layer Security
question
Digital certificates are issued by organizations known as what term?
answer
Certification authorities
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
answer
VPN gateway
question
What authentication protocol sends authentication information in cleartext without encryption?
answer
PAP
question
True
answer
PPP can support several types of Network layer protocols that might use the connection.?
question
60 days
answer
How often should administrators and network users be required to change their password?
question
TKIP
answer
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
question
False
answer
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
question
Network layer
answer
At what layer of the OSI model does the IPSec encryption protocol
operate?
question
smurf attack?
answer
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?
question
IRC
answer
Botnets often make use of what chat protocol in order to receive commands??
question
0.0.0.0?
answer
In ACL statements, the any keyword is equivalent to using what wildcard mask below?
question
True
answer
class="flashcard__a_text">A SOHO wireless router typically acts as a firewall and may include packet filtering options.
question
Natas
answer
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
question
Virtual Wire mode
answer
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire??
question
banner-grabbing attack
answer
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??
question
amplification attack
answer
A reflective attack can be increased in intensity by combining it with what type of attack?
question
polymorphism
answer
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
question
Logic Bomb
answer
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date??
question
metasploit
answer
Which software below combines known scanning techniques and exploits to allow for
hybrid exploits??
question
dynamic ARP inspection
answer
What feature on some network switches can be used to detect faked arp messages?
question
True
answer
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
question
SSTP
answer
What protocol below is a Microsoft proprietary protocol first available in Windows Vista??
question
True
answer
PPP can support several types of Network
layer protocols that might use the connection.
question
160 bit
answer
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
question
PaaS
answer
Which cloud computing service model gives software developers access to multiple operating systems for testing?
question
DirectAccess
answer
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
question
PPPoE
answer
Which remote access protocol is used over an Ethernet network?
question
IPsec
answer
Which encryption protocol does GRE use to increase the security of its transmissions?
question
L2TP
answer
Which tunneling protocol is accepted and used by multiple vendors?
question
Brute force attack
answer
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?
class="q_and_img">question
128 bits
answer
What is the minimum acceptable key size for today's security standards?
question
Private key
answer
In public key encryption, which key is used to decrypt the message?
question
Port forwarding
answer
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
question
Access control
answer
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?
question
IaaS?
answer
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers??
question
SaaS
answer
?What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
question
SHA-2
answer
?What option below is not an encryption algorithm method that is used by SSH?
question
?22
answer
?What option below is not an encryption algorithm method that is used by SSH?
question
EAP
answer
?What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
question
?In the authorized keys file on the host where the SSH server is.
answer
When using public and private keys to connect to an SSH server, where must your public key be placed??
question
?non-repudiation
answer
What security principle provides proof of delivery and proof of the sender's identity??
question
?certification authorities
answer
Digital certificates are issued by organizations known as what term??
question
?IPSec
answer
?What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
question
?FCS
answer
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field??
question
?PAP
answer
What authentication protocol sends authentication information in cleartext without encryption??
question
TKIP
answer
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
Popular Essay Topics
- John Locke essays
- 9/11 essays
- A Good Teacher essays
- A Healthy Diet essays
- A Modest Proposal essays
- A&P essays
- Academic Achievement essays
- Achievement essays
- Achieving goals essays
- Admission essays
- Advantages And Disadvantages Of Internet essays
- Alcoholic drinks essays
- Ammonia essays
- Analytical essays
- Ancient Olympic Games essays
- APA essays
- Arabian Peninsula essays
- Argument essays
- Argumentative essays
- Art essays
- Atlantic Ocean essays
- Auto-ethnography essays
- Autobiography essays
- Ballad essays
- Batman essays
- Binge Eating essays
- Black Power Movement essays
- Blogger essays
- Body Mass Index essays
- Book I Want a Wife essays
- Boycott essays
- Breastfeeding essays
- Bulimia Nervosa essays
- Business essays
- Business Process essays
- Canterbury essays
- Carbonate essays
- Catalina de Erauso essays
- Cause and Effect essays
- Cesar Chavez essays
- Character Analysis essays
- Chemical Compound essays
- Chemical Element essays
- Chemical Substance essays
- Cherokee essays
- Cherry essays
- Childhood Obesity essays
- Chlorine essays
- Classification essays
- Cognitive Science essays
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New
Haven't found what you were looking for?
Enter your email to get the sample
By clicking Send Me The Sample you agree to our Terms and Conditions. We won’t send you irrelevant messages or spam.
Thanks! The sample has been sent.
Check your Inbox or join StudyHippo now to benefit from thousands of ideas
Join StudyHippo now
Unfortunately copying the content is not possible
Tell us your email address and we’ll send this sample there.
By continuing, you agree to our Terms and Conditions.