WAN Q5

  1. Which of the following is a algorithm that ensures unauthorized persons do not tamper with the transmitted messages?




    D) MD5
  2. For teleworkers, what type of connection should be used when mobile access during traveling is required and broadband options are unavailable?




    D) dialup
  3. Match the description with the corresponding VPN characteristic.

    Description:
    ensures that the communicating peers are who they say they are
    ensures that the data are not tampered while travelling between the source and destination
    protects the contents of the message from eavesdroppings by unauthorised personnels

    VPN Characteristics:
    Data Integrity
    Authentication
    Data Confidentiality
    • ensures that the communicating peers are who they say they are => Authentication
    • ensures that the data are not tampered while travelling between the source and destination => Data Integrity
    • protects the contents of the message from eavesdroppings by unauthorised personnels => Data Confidentiality
  4. What are the three main functions of a secure VPN? (Choose three.)






    • B) data integrity     
    • c) authentication    
    • d) data confidentiality
  5. Which of the following are two characteristics of Asymmetric Encryption? (Choose two.)




    • D) Typically used in digital certification and key management
    • c) Uses different keys for encryption and decryption
  6. Which of the following are two peer authentication methods used in VPN? (Choose two.)




    • D) RSA signature     
    • c) Pre-shared key (PSK)
  7. Which of the following two statements are TRUE about Digital Subscriber Line (DSL)? (Choose two.)





    • D) Micro filters are used to separate ADSL from voice at the customer premises     
    • d) Asymmetric DSL (ADSL) provides higher download bandwidth to the user than upload bandwidth.
  8. Authentication Header (AH) provides the following:




    B) Authentication and Integrity
  9.                                                       is used to connect to connect teleworker’s computer to the company’s network via the VPN tunnel across the Internet.




    A) Remote-Access VPN
  10. Which of the following is NOT a benefit of using VPN?




    A) Does not requires additional hardware or software
Author
kirin
ID
167265
Card Set
WAN Q5
Description
Wide Area Network Quiz 5 - Teleworker Services
Updated