WAN Q5

Card Set Information

Author:
kirin
ID:
167265
Filename:
WAN Q5
Updated:
2012-08-24 11:21:20
Tags:
WAN Quiz
Folders:

Description:
Wide Area Network Quiz 5 - Teleworker Services
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user kirin on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following is a algorithm that ensures unauthorized persons do not tamper with the transmitted messages?

    A) 3DES
    B) AES
    C) MD5
    D) RSA
    C) MD5
    (this multiple choice question has been scrambled)
  2. For teleworkers, what type of connection should be used when mobile access during traveling is required and broadband options are unavailable?

    A) residential cable
    B) dialup
    C) satellite
    D) DSL
    B) dialup
    (this multiple choice question has been scrambled)
  3. Match the description with the corresponding VPN characteristic.

    Description:
    ensures that the communicating peers are who they say they are
    ensures that the data are not tampered while travelling between the source and destination
    protects the contents of the message from eavesdroppings by unauthorised personnels

    VPN Characteristics:
    Data Integrity
    Authentication
    Data Confidentiality
    • ensures that the communicating peers are who they say they are => Authentication
    • ensures that the data are not tampered while travelling between the source and destination => Data Integrity
    • protects the contents of the message from eavesdroppings by unauthorised personnels => Data Confidentiality
  4. What are the three main functions of a secure VPN? (Choose three.)

    a) data integrity
    b) accounting
    c) authentication
    d) data confidentiality
    e) data availability
    f) authorization
    • a) data integrity     
    • c) authentication    
    • d) data confidentiality
  5. Which of the following are two characteristics of Asymmetric Encryption? (Choose two.)

    a) Typically used in digital certification and key management
    b) Also called secret key encryption
    c) Uses different keys for encryption and decryption
    d) Key length is fixed at 128-bits
    • a) Typically used in digital certification and key management
    • c) Uses different keys for encryption and decryption
  6. Which of the following are two peer authentication methods used in VPN? (Choose two.)

    a) RSA signature
    b) AES
    c) Pre-shared key (PSK)
    d) Secure Hash Algorithm 1 (SHA-1)
    • a) RSA signature     
    • c) Pre-shared key (PSK)
  7. Which of the following two statements are TRUE about Digital Subscriber Line (DSL)? (Choose two.)

    a) DSL is available in any location that has a telephone
    b) Micro filters are used to separate ADSL from voice at the customer premises
    c) DSL provides high-speed connections over the same coaxial cable that delivers cable television.
    d) Asymmetric DSL (ADSL) provides higher download bandwidth to the user than upload bandwidth.
    e) DSL uses RF signal for transmission
    • b) Micro filters are used to separate ADSL from voice at the customer premises     
    • d) Asymmetric DSL (ADSL) provides higher download bandwidth to the user than upload bandwidth.
  8. Authentication Header (AH) provides the following:

    A) Authentication, Confidentiality and Integrity
    B) Authentication and Integrity
    C) Authentication only
    D) Authentication and Confidentiality
    B) Authentication and Integrity
    (this multiple choice question has been scrambled)
  9.                                                       is used to connect to connect teleworker’s computer to the company’s network via the VPN tunnel across the Internet.

    A) Teleworker VPN
    B) Site-to-Site VPN
    C) Remote-Access VPN
    D) Remote-Site VPN
    C) Remote-Access VPN
    (this multiple choice question has been scrambled)
  10. Which of the following is NOT a benefit of using VPN?

    A) Does not requires additional hardware or software
    B) Cost-savings
    C) Security
    D) Scalability
    A) Does not requires additional hardware or software
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview