Name:     ID: 
 
    Email: 

CNG 131 Chapter 04

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

Telnet is the standard terminal emulation protocol within the TCP/IP protocol suite defined by RFC 854.
 

 2. 

A local private network (LPN) is an encrypted connection that is carried across a shared public infrastructure.
 

 3. 

Tunneling is a technology that enables one network to send its data via another network's connections.
 

 4. 

The simplest VPN solution consists of a VPN client computer with an Internet connection and a compatible server product.
 

 5. 

Many IT professionals look to using certificates to add a layer of security to their VPN clients.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

PPTP protocol performs the following tasks:
a.
allocates channels and places outgoing calls
b.
notifies Windows NT server of incoming calls
c.
transmits and receives user data with bidirectional flow control
d.
All of the above
 

 7. 

A device used in SSH to manage certificates is called a(n):
a.
IP security
c.
network access server
b.
certificate revocation list
d.
security parameter index
 

 8. 

What is the protocol that IPSec uses?
a.
TCP/IP
c.
ESP
b.
SLIP
d.
UDP
 

 9. 

A connectionless protocol that offers a direct way to send and receive datagrams over an IP network is called a(n):
a.
UDP
c.
SNMP
b.
SLIP
d.
TCP/IP
 

 10. 

Using any of the remote access methods, the user connects to a(n):
a.
handshaking
c.
tunneling
b.
secure shell
d.
network access server
 

 11. 

An arbitrary 32-bit number used to specify to the device receiving the packet not only what group of security protocols the sender is using to communicate but algorithms and keys is known as:
a.
EAP over LAN
c.
security parameter index
b.
IP Security
d.
RADIUS
 

 12. 

Which international group has developed a method of security the network via Layer 3?
a.
LDAP
c.
HMAC
b.
IETF
d.
SOHO
 

 13. 

The protocol suite based on powerful, new encryption technologies and adds security services to the IP layer is called:
a.
3DES
c.
IPSec
b.
TLS
d.
LDAP
 

 14. 

A variable number of bytes, from 0 to 255 bytes of data, that allows for data encryption is called:
a.
padding
c.
header
b.
blocking
d.
footer
 

 15. 

What is the default cipher for the IPSec?
a.
PGP
c.
DES-CBC
b.
3DES
d.
ESP
 

 16. 

What allows you to pass reserved IP address through a public network that otherwise would not accept them?
a.
tunneling
c.
authentication
b.
VPN
d.
cipher
 

 17. 

What is a digital signature computed over the remaining part of the ESP?
a.
hashed message
c.
IPSec
b.
integrity check value
d.
authentication field
 

 18. 

What did many large companies begin to use as a method to reduce costs and improve employee satisfaction?
a.
physical access
c.
telecommuting
b.
client computing
d.
central office
 

 19. 

What is it called when the VPN client is on the Internet and the central office intranet at the same time?
a.
telecommuting
c.
secure connection
b.
surfing
d.
split tunneling
 

 20. 

What does SOHO stand for?
a.
small office/home office
c.
small office/hierarchical office
b.
single office/home office
d.
strategic office/home office
 

 21. 

A method of remotely controlling a virtual desktop behind the security perimeter without moving the actual data beyond the control of the central office is called:
a.
VPN client
c.
virtual session
b.
remote session
d.
All of the above
 

 22. 

There are currently several products that could be used as the foundation for a remote session solution. Which one(s) did the book discuss?
a.
Microsoft Terminal Server
c.
Virtual Network Computing
b.
Citrix Metaframe
d.
All of the above
 

 23. 

What is a secure replacement for remote logon and file transfer programs such as Telnet and FTP?
a.
L2TP
c.
NAS
b.
SSH
d.
PPP
 

 24. 

Many network administrators have found that the most effective way to control Telnet access is to use a firewall that can filter traffic based on which of the following?
a.
ports
c.
IP addresses
b.
UDP
d.
Both A and C
 

 25. 

Which of the following technologies can VPN use for remote access?
a.
ISDN lines
c.
cable modem
b.
DSL
d.
All of the above
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
tunneling
e.
vulnerabilities
b.
IPSec
f.
ESP
c.
authentication
g.
hash
d.
secure shell (SSH)
h.
IEEE 802.1x
 

 26. 

A program used to log on to another computer over a network.
 

 27. 

A set of protocols developed by the IETF.
 

 28. 

An Internet standard created to perform authentication services for remote access to a central LAN.
 

 29. 

Provides a mix of security services in IPv4 and IPv6.
 

 30. 

Protocol that ensures the individual is who he/she claims to be.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
SLIP
e.
VPN
b.
handshaking
f.
Telnet
c.
PPP
g.
SOHO
d.
tunneling
h.
multilink
 

 31. 

Enables one network to send its data via another network's connections.
 

 32. 

Makes sure the computers know how to talk to each other.
 

 33. 

Provides redundancy by bonding multiple links into a single channel.
 

 34. 

Standard terminal emulation protocol within TCP/IP protocol.
 

 35. 

Remote access method that secures the connection between the user and the home office.
 



 
Submit          Reset Help