Deck 7: Cloud Computing and Remote Access

ملء الشاشة (f)
exit full mode
سؤال
What protocol below only provides the framework for authenticating clients and servers,but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

A)priority
B)FCS
C)FEC
D)encryption
سؤال
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
سؤال
The combination of a public key and a private key are known by what term below?

A)key set
B)key team
C)key pair
D)key tie
سؤال
Which of the following is NOT an encryption algorithmused by SSH?

A)SHA-2
B)DES
C)RSA
D)Kerberos
سؤال
What security principle provides proof of delivery and proof of the sender's identity?

A)utility
B)integrity
C)availability
D)non-repudiation
سؤال
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
سؤال
When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?

A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
سؤال
When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?

A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
سؤال
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
سؤال
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

A)L2TP
B)TLS
C)IPsec
D)SSL
سؤال
Digital certificates are issued by organizations known as what term?

A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
سؤال
The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?

A)128 bit
B)160 bit
C)256 bit
D)512 bit
سؤال
PPP can support several types of Network layer protocols that might use the connection.
سؤال
Windows,UNIX,Linux,and Mac OS clients are all capable of connecting to a VPN usingPPTP.
سؤال
At what layer of the OSI model does the IPsec encryption protocol operate?

A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
سؤال
After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.
سؤال
What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?

A)IaaS
B)SaaS
C)XaaS
D)PaaS
سؤال
The SSH service listens on what TCP port?

A)20
B)21
C)22
D)23
سؤال
Which type of cloud service model involves hardware services that are provided virtually,including network infrastructure devices such as virtual servers?

A)IaaS
B)PaaS
C)SaaS
D)XaaS
سؤال
When PPP is used over an Ethernet network,it is known as ________________.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
سؤال
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

A)Kerberos
B)TKIP
C)AES
D)EAP
سؤال
What authentication protocol sends authentication information in cleartext without encryption?

A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
سؤال
The key management phase of IPSec is reliant on which two services below?

A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
سؤال
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

A)L2TP
B)PPTP
C)TTLS
D)SSTP
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
سؤال
What two key lengths are the most popular for the SHA-2 hashing algorithm?

A)160
B)256
C)512
D)1024
سؤال
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
سؤال
A _________________ is a service that is shared between multiple organizations,but not available publicly.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
سؤال
What two options below are AAA services?

A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
سؤال
What two different types of encryption can be used by IPsec during data transfer?

A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
سؤال
How often should administrators and network users be required to change their password?

A)60 days
B)90 days
C)120 days
D)180 days
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
سؤال
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
سؤال
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
سؤال
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?

A)OpenVPN
B)SLIP
C)PPTP
D)PPP
سؤال
A SecurID key chain fob from RSA security generates a password that changes how often?

A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
سؤال
Describe how public key encryption works.
سؤال
Describe the three way handshake process as used by CHAP.
سؤال
What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?
سؤال
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
سؤال
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
سؤال
How is GRE used by the PPP protocol?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Cloud Computing and Remote Access
1
What protocol below only provides the framework for authenticating clients and servers,but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
C
2
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

A)priority
B)FCS
C)FEC
D)encryption
B
3
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
False
4
The combination of a public key and a private key are known by what term below?

A)key set
B)key team
C)key pair
D)key tie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT an encryption algorithmused by SSH?

A)SHA-2
B)DES
C)RSA
D)Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What security principle provides proof of delivery and proof of the sender's identity?

A)utility
B)integrity
C)availability
D)non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?

A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?

A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

A)L2TP
B)TLS
C)IPsec
D)SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Digital certificates are issued by organizations known as what term?

A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?

A)128 bit
B)160 bit
C)256 bit
D)512 bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
PPP can support several types of Network layer protocols that might use the connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Windows,UNIX,Linux,and Mac OS clients are all capable of connecting to a VPN usingPPTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
At what layer of the OSI model does the IPsec encryption protocol operate?

A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?

A)IaaS
B)SaaS
C)XaaS
D)PaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The SSH service listens on what TCP port?

A)20
B)21
C)22
D)23
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which type of cloud service model involves hardware services that are provided virtually,including network infrastructure devices such as virtual servers?

A)IaaS
B)PaaS
C)SaaS
D)XaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
When PPP is used over an Ethernet network,it is known as ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

A)Kerberos
B)TKIP
C)AES
D)EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What authentication protocol sends authentication information in cleartext without encryption?

A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The key management phase of IPSec is reliant on which two services below?

A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

A)L2TP
B)PPTP
C)TTLS
D)SSTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What two key lengths are the most popular for the SHA-2 hashing algorithm?

A)160
B)256
C)512
D)1024
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
A _________________ is a service that is shared between multiple organizations,but not available publicly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What two options below are AAA services?

A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What two different types of encryption can be used by IPsec during data transfer?

A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
How often should administrators and network users be required to change their password?

A)60 days
B)90 days
C)120 days
D)180 days
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?

A)OpenVPN
B)SLIP
C)PPTP
D)PPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A SecurID key chain fob from RSA security generates a password that changes how often?

A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe how public key encryption works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe the three way handshake process as used by CHAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
How is GRE used by the PPP protocol?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.