logo image

Network+ ch 7 – Cloud Computing and Remote Access

“What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?”
EAP
What two different types of encryption can be used by IPsec during data transfer?
Encapsulating Security Payload (ESP)
Authentication Header (AH)
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
The SSH service listens on what TCP port?
22
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
SSTP
How often should administrators and network users be required to change their password?
60 days
What two key lengths are the most popular for the SHA-2 hashing algorithm?
256, 512
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
False
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
TKIP
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
False
PPP can support several types of Network layer protocols that might use the connection.
True
A SecurID key chain fob from RSA security generates a password that changes how often?
every 60 seconds
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
The key management phase of IPsec is reliant on which two services below?
Internet Security Association and Key Management Protocol (ISAKMP),
Internet Key Exchange (IKE)
What authentication protocol sends authentication information in cleartext without encryption?
PAP
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
FCS
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
True
Digital certificates are issued by organizations known as what term?
certification authorities
The combination of a public key and a private key are known by what term below?
key pair
Which of the following is NOT an encryption algorithm used by SSH?
SHA-2
What two options below are AAA services?
TACACS+
RADIUS
When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
In an authorization file on the host where the SSH server is.
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
160 bit
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPsec
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Citrix Xen
What security principle provides proof of delivery and proof of the sender’s identity?
non-repudiation
At what layer of the OSI model does the IPsec encryption protocol operate?
Network layer
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
SLIP, PPP
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway

Need essay sample on "Network+ ch 7 – Cloud Computing and Remote Access"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy