Which of the following is a algorithm that ensures unauthorized persons do not tamper with the transmitted messages?
For teleworkers, what type of connection should be used when mobile access during traveling is required and broadband options are unavailable?
Match the description with the corresponding VPN characteristic.
ensures that the communicating peers are who they say they are
ensures that the data are not tampered while travelling between the source and destination
protects the contents of the message from eavesdroppings by unauthorised personnels
ensures that the communicating peers are who they say they are => Authentication
ensures that the data are not tampered while travelling between the source and destination => Data Integrity
protects the contents of the message from eavesdroppings by unauthorised personnels => Data Confidentiality
What are the three main functions of a secure VPN? (Choose three.)
B) data integrity
d) data confidentiality
Which of the following are two characteristics of Asymmetric Encryption? (Choose two.)
D) Typically used in digital certification and key management
c) Uses different keys for encryption and decryption
Which of the following are two peer authentication methods used in VPN? (Choose two.)
D) RSA signature
c) Pre-shared key (PSK)
Which of the following two statements are TRUE about Digital Subscriber Line (DSL)? (Choose two.)
D) Micro filters are used to separate ADSL from voice at the customer premises
d) Asymmetric DSL (ADSL) provides higher download bandwidth to the user than upload bandwidth.
Authentication Header (AH) provides the following:
B) Authentication and Integrity
is used to connect to connect teleworker’s computer to the company’s network via the VPN tunnel across the Internet.
A) Remote-Access VPN
Which of the following is NOT a benefit of using VPN?
A) Does not requires additional hardware or software