78%(9)7 out of 9 people found this document helpful
This preview shows page 1 - 2 out of 5 pages.
Ch 71.Which cloud computing service model gives software developers access to multiple operating systems for testing? 2.What service in Windows Server 2012 r2 authenticates remote users and computers to the Windows domain and its corporate network resources? 3.Which remote access protocol is used over an Ethernet network? 4.Which encryption protocol does GRE use to increase the security of its transmissions? 5.Which tunneling protocol is accepted and used by multiple vendors? 6.A hacker runs a program that tries numerous character combinations until it stumbles on the correct combo and cracks the key. What offensive strategy is this program using? 7.What is the minimum acceptable key size for today’s security standards? 8.In public key encryption, which key is used to decrypt the message? 9.What feature must be configured on a router to redirect traffic from an insecure port to a secure one?10.Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?11.Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a Community Cloud (p336)12.All types of remote access techniques require some type of Remote access server(RAS) p337, which accepts a remote connection and grants privileges to the network’s resources.13.Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use? UDP 14.What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?15.What are the two primary encryption techniques used by VPNs today? 16.When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates? 17.Which two protocols are available to create secure transmissions for HTTP sessions?