Asked by ae097es
ITSY 2301 Exam 4 Top of Form QUESTION 1 Which of the following...
ITSY 2301 Exam 4
Top of Form
QUESTION 1
- Which of the following is a protocol that replaces the use of telnet and rlogin to log in to a shell on a remote host?
QUESTION 2
- What is a virtual private network (VPN) protocol that requires public key infrastructure (PKI) support to obtain and use a certificate?
QUESTION 3
- A hardware virtual private network (VPN) is a standalone device, dedicated to managing VPN functions.
QUESTION 4
- While there is no single way to troubleshoot a virtual private network (VPN) issue, what is the MOST appropriate first step?
QUESTION 5
- Lin is designing a virtual private network (VPN) implementation as a class project. The assignment includes a budget she has to follow. To save money, she decided to use a VPN without a firewall. What is the problem with her decision?
QUESTION 6
- Maria is a new network engineer for a company that was established more than 30 years ago. She is examining the IT infrastructure and discovers that the virtual private network (VPN) solution employs an older encryption protocol for backward compatibility. This protocol has largely been replaced, but it used to be popular in early VPN solutions. What is this protocol?
QUESTION 7
- Isabelle is a network engineer deploying an IT infrastructure in one of her company's new branch offices. Currently, she is designing a local subnetwork that contains and exposes the office's external services to a larger, untrusted network, specifically the Internet. What is this called?
QUESTION 8
- A company uses an Internet Protocol Security (IPSec) virtual private network (VPN) solution. It allows remote users to connect to the main office and allows communication between the main office and branch offices securely over the Internet. The main office network uses network address translation (NAT) with an internal IP address range of 192.168.0.1 to 192.168.0.254. Which of the following ranges must remote offices and users NOT use on their internal networks?
QUESTION 9
- Sebastian is the HR department's trainer. He is developing various materials to teach the fundamentals of using a virtual private network (VPN) to a variety of audiences, from the president and vice presidents of the corporation to newly hired mid-level managers and entry-level employees. After implementing his training program some weeks ago, he began getting calls from the IT help desk stating that users are contacting them with troubleshooting issues for their VPN sessions. The help desk technicians do not know how to respond. What is the most likely problem?
QUESTION 10
- When monitoring a virtual private network (VPN), multiple concurrent employee connections may indicate a security issue.
QUESTION 11
- Whereas privacy is the ability of a network or system user to remain unknown, anonymity is keeping information about a network or system user from disclosure.
QUESTION 12
- In balancing competing concerns while deploying a personal virtual private network (VPN) solution, Yee values his privacy more than his anonymity. Which is he most concerned about?
QUESTION 13
- The Network Layer of the Open Systems Interconnection (OSI) Reference Model is the protocol layer that transfers data between adjacent network nodes.
QUESTION 14
- Dhruv is a network engineer using a command-line interface on his computer. He types the command mstsc/v and then a server name. What is he doing?
QUESTION 15
- A virtual private network (VPN) policy should be a part of an overall IT security policy framework to avoid duplicate or conflicting information.
QUESTION 16
- Whereas a virtual private network (VPN) encrypts pieces of data, a firewall protects the internal network from outside threats.
QUESTION 17
- Authentication Header (AH) provides integrity protection for packet headers and data, as well as user authentication.
QUESTION 18
- Aileen is a help desk technician. She and her coworkers start getting a lot of calls from remote workers saying that their virtual private network (VPN) connection to the office abruptly dropped. Last month, Aileen helped deploy a new VPN solution that uses redundant VPN devices with their own power sources connecting to an Internet circuit. What is the most likely cause of the problem?
QUESTION 19
- With hosted services, an Internet service provider (ISP) or a software vendor leases applications to organizations.
QUESTION 20
- Which of the following is a protocol that supports Advanced Encryption Standard (AES) with 128, 192, and 256 keys?
QUESTION 21
- Jacob is a remote employee. He clicks the Start menu button in Windows and selects an application to run. Most of the time, he is unaware that he is really accessing the application on a server at his company's main office several miles away. What solution is he using?
QUESTION 22
- A benefit of a commercial virtual private network (VPN) solution is access to vendor support.
QUESTION 23
- Which of the following is the protocol used with HTTPS for encrypting communications to and from websites?
QUESTION 24
- The IT department of a company has just rolled out a virtual private network (VPN) solution that offers greater flexibility, delegation of management, and added security over the previous implementation. What is this solution called?
QUESTION 25
- Cassie is an IT help desk representative. She just received a trouble ticket from a remote user stating they cannot connect to the company network over the virtual private network (VPN). Cassie begins troubleshooting the matter, checking on recent configuration changes to the VPN equipment, looking at the unit's logs for error messages, and so on. She has examined the VPN-related features and potential problems but still doesn't understand why the end user's connection failed. She has been assured that both the end user and the company have Internet connectivity. What is the most likely reason the user cannot connect?
QUESTION 26
- Which of the following is an advantage of Secure Sockets Layer/Transport Layer Security (SSL/TLS) virtual private networks (VPNs) versus Internet Protocol Security (IPSec) VPNs?
QUESTION 27
- In a gateway-to-gateway virtual private network (VPN), the mobile user takes specific actions to connect to the VPN.
QUESTION 28
- Tonya is an accountant working from home. She connects to her office each day over a virtual private network (VPN). The IT department for her company has deployed a VPN appliance to assist employees such as Tonya in performing their tasks remotely. What solution does Tonya use to access her files on the company's accounting server?
QUESTION 29
- A customer premise equipment (CPE)-based virtual private network (VPN) is a VPN appliance.
QUESTION 30
- Which of the following can perform authentication to provide integrity protection for the outermost IP header?
QUESTION 31
- Your sales department likes to stream professional sports games across the computer network on Wednesday afternoons, causing VPN performance issues during that time. What is the most likely cause of the performance issues?
QUESTION 32
- Microsoft DirectAccess enables administrators to execute control over remote clients such as through Group Policy.
QUESTION 33
- Susan is a network professional at a mid-sized company. Her supervisor has assigned her the task of designing a virtual private network (VPN) implementation. Susan has set up strong authentication and encryption in a test environment, and the VPN appliance is directly facing the Internet. When her work is evaluated, what does her supervisor immediately notice?
QUESTION 34
- Alice is a network engineer who has been tasked with researching a virtual private network (VPN) tunneling protocol to be used by her company. It must be able to pass traffic through a network address translation (NAT) server and be compatible with a number of well-known proprietary and open source platforms. What solution does she select?
QUESTION 35
- The stability of a virtual private network (VPN) connection can be affected by the number of firewalls and routers it must traverse.
QUESTION 36
- Which of the following best describes a technology with the least inherent security risks and is less likely to reveal information a user did NOT intend to share?
QUESTION 37
- A virtual private network (VPN) policy documents an organization's rules for using the VPN.
QUESTION 38
- Which of the following is one of the most common and easily exploited vulnerabilities on any hardware network device?
QUESTION 39
- Internet Protocol Security (IPSec) has three major components: Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE).
QUESTION 40
- Jahi is a security engineer for a U.S. Department of Defense contractor. He is implementing a more secure method for remote users to log into an internal system over a virtual private network (VPN). In addition to requiring a password, this method asks the user to enter a PIN texted to their mobile phone, and to use a fingerprint reader mounted to their company-issued laptop. Which method is Jahi deploying?
QUESTION 41
- Which of the following statements is TRUE of an Internet Protocol Security (IPSec) virtual private network (VPN) when compared to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) VPN?
QUESTION 42
- Analisa is a sales representative who travels extensively. At a trade show, Analisa uses her virtual private network (VPN) connection to simultaneously connect to the office LAN and her personal computer at home. What security risk does this pose?
QUESTION 43
- Which of the following provides integrity protection for packet headers and data and can optionally provide replay protection and access protection?
QUESTION 44
- A virtualized Secure Sockets Layer (SSL) virtual private network (VPN) provides the ability to create custom authentication methods.
QUESTION 45
- Software-based virtual private networks (VPNs) are typically more scalable than hardware VPNs.
QUESTION 46
- Which of the following steps helps you verify that the internal network port of a virtual private network (VPN) device is available?
QUESTION 47
- Tomika is a network architect. A coworker is helping to design a more secure placement of the company's virtual private network (VPN) device. The coworker suggests that the device be placed between the Internet-facing firewall and the internal network. What is Tomika's opinion of this deployment strategy?
QUESTION 48
- Remote Desktop Connection (RDC) is a built-in application that uses what proprietary protocol?
QUESTION 49
- Wen, a network engineer for a mid-sized company, is rolling out a virtual private network (VPN) solution that is easy to set up, manage, and maintain and represents the majority of VPN platforms on the market. What type of VPN is Wen deploying?
QUESTION 50
- Which component of a virtual private network (VPN) policy describes the parameters for employee use of the VPN, including consequences for not following the policy?
Bottom of Form
Answered by GeneralRock5458
Unlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answerultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lore
gue
ipi
, ultrices ac magna. Fusce dui lectu
ec aliqu
cing elit. Na
llentesq
pulvinar tortor nec facilisis. Pellentesque dapibus efficitur
rem ipsum dolor sit amet,
ec aliqu
ipsum do
et, consectetur adipiscing elit. Nam
ac, dict
ipiscinm risus anipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel
risus ante, dapibus a molestie con
tesque dapibus efficiturletrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum virem ipsum, consectetur adipiscing elit. Nam laci
ipiscing elit. Nam lacinia pulvinar tortor nec f
itur laoreet
consectetur adipiscing elit. Nam lacini
ctum vitae odio. Donec aliqu
llentesque dapibus effici
fficitur laoreet. Nam risus an
e vel laoreet ac, dictum vitae
cing elit. Nam lacinia pulvinar tortor n
nec facilisis.
Donec a
risus ante, dapibus a molestie consequat, ultrices ac magna.
, consectetur adipiscing elit. Nam lacin
Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing eli
ec aliquet. Lorem ipsum
sum dolor sit amet, cons
inia pulvinar tort
entesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue ve
iscing elit. Nam l
or nec facilisis. Pellentesque dapi
congue vel laoreet ac, dictum vitae odio
ac, dictum vitae odio. Donec aliquet. Lo
ctum vitae odio. Donec al
sum dol
ur lFusce dui lectussum dolor sit am
sus ante, dapibus a molestie co
facilisis. Pellentesque dapibus e
ec facilisis. Pellentesque dap
rem ipsum
gue
gue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam laci
et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvina
pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor ne
a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec ali
ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips
lestie conseq
itur laoreet.
rem ipsum dolor sit amet, consectetur adi
s a molestie
molestie cons
lestie consequat,
e vel laoreet ac, dictum v
molestie consequat, ultr
gue