100%(2)2 out of 2 people found this document helpful
This preview shows page 1 - 4 out of 33 pages.
Chapter_07_Cloud_Computing_and_Remote_AccessQuestion 1 (1 point) Question 1 SavedAn enterprise-wide VPN can include elements of both the client-to-site and site-to-site modelsQuestion 1 options:10SaveQuestion 2 (1 point) Question 2 SavedAfter L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tuQuestion 2 options:10SaveQuestion 3 (1 point) Question 3 SavedThe MD5 hashing algorithm is not susceptible to the possibility of hash collisions.Question 3 options:10SaveQuestion 4 (1 point) Question 4 SavedPPP can support several types of Network layer protocols that might use the connection.Question 4 options:10SaveQuestion 5 (1 point) Question 5 SavedWindows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.Question 5 options:10SaveQuestion 6 (1 point) Question 6 SavedWhich type of cloud service model involves hardware services that are provided virtually, incluQuestion 6 options:IaaSPaaSSaaSXaaSSaveQuestion 7 (1 point) Question 7 SavedWhat cloud service model involves providing applications through an online user interface, pro
SaveQuestion 8 (1 point) Question 8 SavedWhat option below is not an encryption algorithm method that is used by SSH?SaveQuestion 9 (1 point) Question 9 SavedThe SSH service listens on what TCP port?SaveQuestion 10 (1 point) Question 10 SavedThe original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and useQuestion 10 options:128 bit160 bit256 bit512 bitSave
Question 11 (1 point) Question 11 SavedWhat protocol below only provides the framework for authenticating clients and servers, but rSave