Chapter 12 Quiz Firewalls

Is this your test? Login to manage it. If not, you can develop a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following key VPN protocols used today is the main alternative for a VPN solution that does not leverage an IPSec solution?
2.
1 point
Which component of Secure Shell (SSH) Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy?
3.
1 point
Which of the following refers to a protocol that provides integrity protection for packet headers and data, as well as user authentication?
4.
1 point
Which of the following describes Layer 2 Tunneling Protocol (L2TP)?
5.
1 point
Operating system virtualization is the emulation of an operating system environment hosted on another operating system.
6.
1 point
Which of the following refers to a network protocol that is a method for secure remote logon and other secure network services over a public network?
7.
1 point
In typical end user/browser usage, SSL/TLS authentication is two-way.
8.
1 point
Which of the following characteristics relates to Point-to-Point Protocol (PPP)?
9.
1 point
One proposed migration strategy for the move from IPv4 to IPv6 includes allowing two IPv6 hosts to create a tunnel for traffic between two IPv6 hosts through an IPv4 network.
10.
1 point
Which term describes an early proprietary protocol from Microsoft?
11.
1 point
Virtual VPNs provide a total logical separation of the VPN’s instances in terms of system resources, routing tables, user databases, and policy management interfaces.
12.
1 point
Which of the following negotiates, creates, and manages security associations?
13.
1 point
The performance characteristics of a VPN supporting remote clients are generally the same as the performance characteristics of a VPN supporting site-to-site connections.
14.
1 point
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, although not for the outermost IP header?
15.
1 point
What is meant by Internet Engineering Task Force (IETF)?
16.
1 point
IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data as it is sent over the network.
17.
1 point
The Secure Shell (SSH) protocol works in combination with rsync to back up, copy, and mirror files securely.
18.
1 point
Although it provides a mechanism for creating tunnels through an IP network, which of the following does not provide a mechanism for encrypting the data being tunneled?
19.
1 point
Which of the following is commonly used (sometimes with an authentication header) to provide both confidentiality and integrity protection for communications?
20.
1 point
Which of the following represents a standards-based protocol suite designed specifically for securing Internet Protocol communications?
21.
1 point
Which of the following refers to an early communications protocol that competed with Point-to-Point Tunneling Protocol?
22.
1 point
The use of PPP has extended the availability of IPv4 address space, thereby extending the life span of IPv4.
23.
1 point
One function of an SSL VPN is that it usually connects using a Web browser, whereas an IPSec VPN generally requires client software on the remote system.
24.
1 point
Which of the following characteristics relates to authentication header (AH)?
25.
1 point
Which of the following is an advantage of SSL/TLS VPNs over IPSec VPNs?