Deck 7: Cloud Computing and Remote Access
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
العب
ملء الشاشة (f)
Deck 7: Cloud Computing and Remote Access
1
What protocol below only provides the framework for authenticating clients and servers,but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
A)MS-CHAP
B)MS-CHAPv2
C)EAP
D)TKIP
C
2
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
A)priority
B)FCS
C)FEC
D)encryption
A)priority
B)FCS
C)FEC
D)encryption
B
3
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
False
4
The combination of a public key and a private key are known by what term below?
A)key set
B)key team
C)key pair
D)key tie
A)key set
B)key team
C)key pair
D)key tie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT an encryption algorithmused by SSH?
A)SHA-2
B)DES
C)RSA
D)Kerberos
A)SHA-2
B)DES
C)RSA
D)Kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What security principle provides proof of delivery and proof of the sender's identity?
A)utility
B)integrity
C)availability
D)non-repudiation
A)utility
B)integrity
C)availability
D)non-repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
When using a site-to-site VPN,what type of device sits at the edge of the LAN and establishes the connection between sites?
A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
A)VPN proxy
B)VPN server
C)VPN transport
D)VPN gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?
A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
A)In an authorization file under your home directory on your computer.
B)In an authorization file on the host where the SSH server is.
C)In the /etc/ssh/keys folder.
D)In the /var/run/ssh/public folder.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
A)VMware vSphere
B)Oracle VirtualBox
C)Parallels
D)Citrix Xen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
A)L2TP
B)TLS
C)IPsec
D)SSL
A)L2TP
B)TLS
C)IPsec
D)SSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Digital certificates are issued by organizations known as what term?
A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
A)certification authorities
B)certification registrars
C)identity verifiers
D)certificate exchanges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?
A)128 bit
B)160 bit
C)256 bit
D)512 bit
A)128 bit
B)160 bit
C)256 bit
D)512 bit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
PPP can support several types of Network layer protocols that might use the connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Windows,UNIX,Linux,and Mac OS clients are all capable of connecting to a VPN usingPPTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
At what layer of the OSI model does the IPsec encryption protocol operate?
A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
A)Physical layer
B)Network layer
C)Transport layer
D)Application layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
After L2TP establishing a VPN tunnel,GRE is used to transmit L2TP data frames through the tunnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?
A)IaaS
B)SaaS
C)XaaS
D)PaaS
A)IaaS
B)SaaS
C)XaaS
D)PaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The SSH service listens on what TCP port?
A)20
B)21
C)22
D)23
A)20
B)21
C)22
D)23
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which type of cloud service model involves hardware services that are provided virtually,including network infrastructure devices such as virtual servers?
A)IaaS
B)PaaS
C)SaaS
D)XaaS
A)IaaS
B)PaaS
C)SaaS
D)XaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
When PPP is used over an Ethernet network,it is known as ________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
A)Kerberos
B)TKIP
C)AES
D)EAP
A)Kerberos
B)TKIP
C)AES
D)EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What authentication protocol sends authentication information in cleartext without encryption?
A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
A)PAP
B)MS-CHAP
C)MS-CHAPv2
D)EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The key management phase of IPSec is reliant on which two services below?
A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
A)Internet Key Exchange (IKE)
B)Internet Security Association and Key Management Protocol (ISAKMP)
C)Authentication Header (AH)
D)Encapsulating Security Payload (ESP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
A)L2TP
B)PPTP
C)TTLS
D)SSTP
A)L2TP
B)PPTP
C)TTLS
D)SSTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
One of two services in the keymanagement phase of creating a secure IPsec connection.Itnegotiates the exchange of keys,including authentication ofthe keys.It uses UDP and usually runs on port 500.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What two key lengths are the most popular for the SHA-2 hashing algorithm?
A)160
B)256
C)512
D)1024
A)160
B)256
C)512
D)1024
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
A _________________ is a service that is shared between multiple organizations,but not available publicly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichhardware services are provided virtually,including networkinfrastructure devices such as virtual servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What two options below are AAA services?
A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
A)OpenSSH
B)OpenVPN
C)RADIUS
D)TACACS+
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
What two different types of encryption can be used by IPsec during data transfer?
A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
A)Secure Sockets Layer (SSL)
B)Authentication Header (AH)
C)Encapsulating Security Payload (ESP)
D)Advanced Encryption Standard (AES)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
How often should administrators and network users be required to change their password?
A)60 days
B)90 days
C)120 days
D)180 days
A)60 days
B)90 days
C)120 days
D)180 days
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?
A)OpenVPN
B)SLIP
C)PPTP
D)PPP
A)OpenVPN
B)SLIP
C)PPTP
D)PPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A SecurID key chain fob from RSA security generates a password that changes how often?
A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
A)every 20 seconds
B)every 30 seconds
C)every 60 seconds
D)every 70 seconds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
Anauthentication protocol that operates over PPP and alsoencrypts usernames and passwords for transmission
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe how public key encryption works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe the three way handshake process as used by CHAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
An encryption keygeneration and management scheme used by 802.11i.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A Layer 2 communicationsprotocol that enables a workstation to connect to a server using a serial connection such as dial-up or DSL.It can support multiple Network layer protocols and can encrypt transmissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Matching
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
Match each correct item with the statement below.
a.IaaS (Infrastructure as a Service)
b.PaaS (Platform as a Service)
c.SaaS (Software as a Service)
d.PPP (Point to Point Protocol)
e.IKE (Internet Key Exchange)
f.AH (Authentication Header)
g.ESP (Encapsulating Security Payload)
h.CHAP (Challenge Handshake Authentication Protocol)
i.TKIP (Temporal Key Integrity Protocol)
j.KDC (Key Distribution Center)KDC)
In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
How is GRE used by the PPP protocol?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck