Endpoint security vulnerability7.What is the minimum acceptable key size for today’s security standards?
8.In public key encryption, which key is used to decrypt the message?9.What feature must be configured on a router to redirect traffic from an insecure port to a secure one?10.Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?A. AuthenticationB. AuthorizationC.Access controlD. Accounting
11.Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a __Community Cloud___.12.All types of remote access techniques require some type of __Remote Access Server (RAS)___, which accepts a remote connection and grants privileges to the network’s resources.13.Which Transport layer protocol does PPTP use? Which Transport layer protocol does L2TP use? PPTP uses TCP, L2TP uses UDP14.What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess? Always on remote connections15.What are the two primary encryption techniques used by VPNs today? I.P.sec & SSL16.When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates? Certificate Authority17.Which two protocols are available to create secure transmissions for HTTP sessions? SSL & TLS18.__Encryption___ is used for confidentiality while __Hashes__ is used for integrity and authentication.19.EAPoL is primarily used with what kind of transmission? Wireless Transmissions20.What kind of ticket is held by Kerberos’ TGS? Ticket-Granting Ticket (TGT)