Term
The VPN was configured inside the Windows 7 Network and __________ Center. |
|
Definition
|
|
Term
The Network and Sharing Center is accessed through the _________. |
|
Definition
|
|
Term
What Option Would You Use To Set Up A VPN Connection? |
|
Definition
|
|
Term
The data encryption rule "No Encryption Allowed" causes the server to ______ if encryption is required. |
|
Definition
|
|
Term
What is an Example Of An EAP Authentication Method Where Encryption Is Not Enabled? |
|
Definition
|
|
Term
What is the acronym for the protocol suite to which EAP belongs? |
|
Definition
|
|
Term
What is an example of People Risk? |
|
Definition
|
|
Term
What are the two general categories of which Network risks are assigned? |
|
Definition
People and Network/Hardware |
|
|
Term
What is an example of a Network/Hardware Risk? |
|
Definition
|
|
Term
What Acronym Best Describes the Cloud Computing Category Anything as a Service? |
|
Definition
|
|
Term
The ability to scale cloud services and resources up or down easily refers to which cloud computing feature? |
|
Definition
|
|
Term
Which of the following describes the ability of a cloud computing provider to host many services for many users on only a few servers? |
|
Definition
|
|
Term
Which type of cloud computing service model should you consider if you want to develop and test an application that works on multiple operating systems? |
|
Definition
|
|
Term
Which cloud computing deployment model shares a service among multiple organizations but is not available to the public? |
|
Definition
|
|
Term
What type of network should you deploy to allow your remote workforce to securely connect to the company network over the Internet? |
|
Definition
|
|
Term
At what layer of the OSI model do SLIP and PPP operate? |
|
Definition
|
|
Term
Which VPN tunneling protocol use GRE to transmit data frames through the tunnel? |
|
Definition
|
|
Term
Which of the following is an example of command–line remote virtual computing software? |
|
Definition
|
|
Term
Which of the following is NOT an assurance provided by encryption? |
|
Definition
|
|
Term
What is the term for a block of data that has been transformed by an encryption algorithm? |
|
Definition
|
|
Term
Which type of encryption uses the same key to encrypt and decrypt a message? |
|
Definition
|
|
Term
Which of the following is a small file that contains a user’s public key and identifying information? |
|
Definition
|
|
Term
Which of the following is an IPsec component that establishes policies for managing keys? |
|
Definition
|
|
Term
What type of encryption does HTTPS use and what protocol and port number does it use? |
|
Definition
|
|
Term
What type of VPN is accessed through a Web browser? |
|
Definition
|
|
Term
Which of the following is a hash algorithm that is resistant to collisions and supports a 512–bit hash? |
|
Definition
|
|
Term
Which authentication protocol provides AAA services, and runs in the Application layer over UDP? |
|
Definition
|
|
Term
Which component of the Kerberos protocol allows a client to request a ticket to contact a service? |
|
Definition
|
|
Term
In what type of attack does a hacker use programs to try many different words to guess a password? |
|
Definition
|
|
Term
Which of the following is NOT a common issue to look out for when troubleshooting a misconfigured remote access device? |
|
Definition
|
|