True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
Telnet is the standard terminal emulation protocol within the TCP/IP protocol suite
defined by RFC 854.
|
|
2.
|
A
local private network (LPN) is an encrypted connection that is carried across a shared public
infrastructure.
|
|
3.
|
Tunneling is a technology that enables one network to send its data via another
network's connections.
|
|
4.
|
The
simplest VPN solution consists of a VPN client computer with an Internet connection and a compatible
server product.
|
|
5.
|
Many
IT professionals look to using certificates to add a layer of security to their VPN
clients.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
PPTP
protocol performs the following tasks: a. | allocates channels and places outgoing
calls | b. | notifies Windows NT server of incoming
calls | c. | transmits and receives user data with bidirectional flow
control | d. | All of the above | | |
|
|
7.
|
A
device used in SSH to manage certificates is called a(n): a. | IP
security | c. | network access
server | b. | certificate revocation list | d. | security parameter index | | | | |
|
|
8.
|
What
is the protocol that IPSec uses?
|
|
9.
|
A
connectionless protocol that offers a direct way to send and receive datagrams over an IP network is
called a(n): a. | UDP | c. | SNMP | b. | SLIP | d. | TCP/IP | | | | |
|
|
10.
|
Using
any of the remote access methods, the user connects to a(n): a. | handshaking | c. | tunneling | b. | secure shell | d. | network access server | | | | |
|
|
11.
|
An
arbitrary 32-bit number used to specify to the device receiving the packet not only what group of
security protocols the sender is using to communicate but algorithms and keys is known
as: a. | EAP over
LAN | c. | security
parameter index | b. | IP Security | d. | RADIUS | | | | |
|
|
12.
|
Which
international group has developed a method of security the network via Layer 3?
|
|
13.
|
The
protocol suite based on powerful, new encryption technologies and adds security services to the IP
layer is called:
|
|
14.
|
A
variable number of bytes, from 0 to 255 bytes of data, that allows for data encryption is
called: a. | padding | c. | header | b. | blocking | d. | footer | | | | |
|
|
15.
|
What
is the default cipher for the IPSec? a. | PGP | c. | DES-CBC | b. | 3DES | d. | ESP | | | | |
|
|
16.
|
What
allows you to pass reserved IP address through a public network that otherwise would not accept
them? a. | tunneling | c. | authentication | b. | VPN | d. | cipher | | | | |
|
|
17.
|
What
is a digital signature computed over the remaining part of the ESP? a. | hashed
message | c. | IPSec | b. | integrity check value | d. | authentication field | | | | |
|
|
18.
|
What
did many large companies begin to use as a method to reduce costs and improve employee
satisfaction? a. | physical
access | c. | telecommuting | b. | client computing | d. | central office | | | | |
|
|
19.
|
What
is it called when the VPN client is on the Internet and the central office intranet at the same
time? a. | telecommuting | c. | secure
connection | b. | surfing | d. | split tunneling | | | | |
|
|
20.
|
What
does SOHO stand for? a. | small office/home office | c. | small office/hierarchical office | b. | single
office/home office | d. | strategic
office/home office | | | | |
|
|
21.
|
A
method of remotely controlling a virtual desktop behind the security perimeter without moving the
actual data beyond the control of the central office is called: a. | VPN
client | c. | virtual
session | b. | remote session | d. | All of the above | | | | |
|
|
22.
|
There
are currently several products that could be used as the foundation for a remote session solution.
Which one(s) did the book discuss? a. | Microsoft Terminal Server | c. | Virtual Network Computing | b. | Citrix
Metaframe | d. | All of the
above | | | | |
|
|
23.
|
What
is a secure replacement for remote logon and file transfer programs such as Telnet and
FTP?
|
|
24.
|
Many
network administrators have found that the most effective way to control Telnet access is to use a
firewall that can filter traffic based on which of the following? a. | ports | c. | IP
addresses | b. | UDP | d. | Both A and C | | | | |
|
|
25.
|
Which
of the following technologies can VPN use for remote access? a. | ISDN
lines | c. | cable
modem | b. | DSL | d. | All of the above | | | | |
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | tunneling | e. | vulnerabilities | b. | IPSec | f. | ESP | c. | authentication | g. | hash | d. | secure shell (SSH) | h. | IEEE 802.1x | | | | |
|
|
26.
|
A
program used to log on to another computer over a network.
|
|
27.
|
A set
of protocols developed by the IETF.
|
|
28.
|
An
Internet standard created to perform authentication services for remote access to a central
LAN.
|
|
29.
|
Provides a mix of security services in IPv4 and IPv6.
|
|
30.
|
Protocol that ensures the individual is who he/she claims to be.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | SLIP | e. | VPN | b. | handshaking | f. | Telnet | c. | PPP | g. | SOHO | d. | tunneling | h. | multilink | | | | |
|
|
31.
|
Enables one network to send its data via another network's connections.
|
|
32.
|
Makes
sure the computers know how to talk to each other.
|
|
33.
|
Provides redundancy by bonding multiple links into a single channel.
|
|
34.
|
Standard terminal emulation protocol within TCP/IP protocol.
|
|
35.
|
Remote access method that secures the connection between the user and the home
office.
|