Lab 13

25 July 2022
4.7 (114 reviews)
19 test answers

Unlock all answers in this set

Unlock answers (15)
question
Which protocol does HTTPS use to offer greater security in Web transactions? A. IPsec B. SSL C. Kerberos D. Username and Password authentication
answer
SSL - Secure Socket Layer HTTPS uses SSL to offer greater security during Web transactions.
question
SSL uses public-key cryptography. True/False?
answer
True
question
SSH transfers data in clear text. True/False?
answer
False. SSH uses public-key cryptography
question
Telnet transfers data in clear text. True/False?
answer
True. It's not very secure.
question
Console port cannot be sniffed. True/False?
answer
True. It's the most secure way to manage a routers configuration.
question
Telnet is insecure because it transfers data in clear text and is easily intercepted. What is an acceptable alternative to Telnet?
answer
SSH. (Secure Shell)
question
Which Security protocols use RSA encryptions to secure communications over an untrusted network? Pick 2. A. Internet Security Association and Key Management Protocol B. Transport Layer Security C. Point-to-Point Tunneling Protocol D. Secure Sockets layer
answer
B. Transport Layer D. Secure Sockets Layer
question
NAT prevents the use of IPsec in most cases. T/F?
answer
T. IPsec can't typically be used when static IP addresses are not used by both communication partners. NAT proxy performs network address translation on all communications.
question
Which two protocols are often added to other protocols to provide secure transmissions of data? TLS SMTP HTTPS SSL SNMP
answer
TLS SSL
question
SSH allows for secure interactive control of remote systems. T/F?
answer
True
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network.
question
What protocol can encapsulate other LAN protocols and carry data securely over an IP network?
answer
PPTP (Point-to-point Tunneling Protocol)
question
Which two protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet?
answer
PPTP and L2TP (Point-to-Point Tunneling Protocol) and (Layer Two Tunneling Protocol)
question
IPsec is implemented through two separate protocols. What are these protocols called?
answer
AH and ESP Authentication Header and Encapsulation Security Payload
question
IPsec provides authentication and encryption services for IP based network traffic. T/F?
answer
True
question
Statement about SSL VPN. True or false? -Encrypts the entire communication session -Uses port 443 -Encapsulates packets by adding a GRE header.
answer
True True False
question
Which of the following can route Layer 3 protocols across an IP network? -SSL -GRE -PPTP -IPsec
answer
GRE
question
To access the desktop of a remote computer or server, use a remote desktop protocol. What is Microsoft's protocol?
answer
RDP (Remote Desktop Protocol)
question
What is a hash?
answer
a function that takes a variable length string (message) and compresses and transforms it into a fixed length variable. Ensures the data integrity of files and messages in transit. Sender and receiver use same hashing algorithm on the original data. If hashes match, data is unmodified. Hashes do not ensure confidentiality.