VPN

Descripción

Test sobre VPN, creado por Del Sutton el 23/04/2015.
Del Sutton
Test por Del Sutton, actualizado hace más de 1 año
Del Sutton
Creado por Del Sutton hace alrededor de 9 años
139
0

Resumen del Recurso

Pregunta 1

Pregunta
Generic Routing Encapsulation (GRE) is a secure VPN technology for use on unsecured Intranets or the Internet ?
Respuesta
  • True
  • False

Pregunta 2

Pregunta
The ____ _____ ____ is the only type of encryption that has been proven to be absolutely impossible to crack if used correctly.
Respuesta
  • one
  • time
  • pad
  • sole

Pregunta 3

Pregunta
Select the most secure of the following encryption standards ?
Respuesta
  • TDES
  • DES
  • AES
  • DDES

Pregunta 4

Pregunta
IKE is the protocol used to set up a ______ ________ in the IPsec protocol suite.
Respuesta
  • Association
  • Secure
  • safe
  • available

Pregunta 5

Pregunta
The goals of cryptography are ?
Respuesta
  • Non-repudiation
  • Efficiency
  • Integrity
  • Authentication
  • Confidentiality
  • None of these.

Pregunta 6

Pregunta
Stream ciphers are generally associated with:
Respuesta
  • Once off authentications
  • High speed
  • Are slow due to the nature of the stream merging with the pseudo-random bits
  • Hardware implementations

Pregunta 7

Pregunta
In probability theory the ________ _________ is that in some set of randomly chosen people some pair of them will have the same birthday.
Respuesta
  • birthday
  • paradox
  • algorithm
  • Random

Pregunta 8

Pregunta
_________ ____ ______________ is used alongside IPsec as a key management protocol incorporating the Oakley key exchange and Skeme key exchange inside the Internet Security Association and Key Management Protocol (ISAKMP) framework.
Respuesta
  • Internet
  • Key
  • Exchange
  • Important

Pregunta 9

Pregunta
With Cisco routers a GRE tunnel is not essential and traffic can be carried through untrusted networks using IPsec when tunnel mode is used ?
Respuesta
  • True
  • False

Pregunta 10

Pregunta
Auguste Kerckhoffs principle or law states that: “a cryptosystem should be secure even if everything about the system, except the key, is public knowledge”
Respuesta
  • True
  • False

Pregunta 11

Pregunta
A Virtual Private Network is either
Respuesta
  • A computer network in which some of the links between nodes are carried over devices that are configured with private IP addresses (192.168.x.x).
  • A computer network built in the home whose IP addresses consist entirely of private addresses (192.168.x.x) and accesses the Internet only by NAT.
  • A network between routers that is hidden from computers around them.
  • A computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires.

Pregunta 12

Pregunta
For IPsec Encryption Transport mode order the protocols within the packet.
Respuesta
  • 1. Outer IP
  • 3. ESP
  • 4. IP
  • 5. Data
  • 2. AH

Pregunta 13

Pregunta
Check the algorithms that are considered hashing functions
Respuesta
  • MD5
  • SHA-1
  • MD-56
  • SHA-256
Mostrar resumen completo Ocultar resumen completo

Similar

Snazzy Flashczardz VPN PAN LAN WAN
George Mather
Mapa Mental Redes VPN
Estudiante AUNAD
Computer Networks Flashcards
Joel Smith
Virtual Networking
Liam-Beckwith
Conexiones de sucursales
JESUS DAVID BELTRAN CRUZ
OS Security Vocabulary
Shantal K Green
Networks
k_gray99
Uso del valor actual neto, tasa interna de retorno para la valoración de las decisiones de inversión
s g
Redes VPN (Red Privada Virtual)
maremarjime92