Network Security Exam 3 - Part 1

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

A VPN creates or simulates a network connection over an intermediary network.

True

2
New cards

A hashing cryptographic function takes the input of any file or message and creates a fixed length output based on:

the hashing algorithm being used.

3
New cards

A host-to-host virtual private network (VPN) is a direct VPN connection between one host and another

True

4
New cards

A remote access link enables access to network resources using a wide area network (WAN) link to connect to the geographically distant network

True

5
New cards

A remote access virtual private network (VPN) is also known as host-to-site VPN because it supports single-host VPN connections into a LAN site

True

6
New cards

A site-to-site virtual private network (VPN) is also known as a LAN-to-LAN VPN

True

7
New cards

A virtual private network (VPN) can operate securely over the Internet and still provide high levels of security through encryption

True

8
New cards

A virtual private network (VPN) connection ensures quality of service.

False

9
New cards

Asymmetric cryptography that uses key pairs is commonly known as:

public key cryptography

10
New cards

Effective virtual private network (VPN) policies clearly define security restrictions imposed on VPNs.

True

11
New cards

Hashing modifies the original data

False

12
New cards

In symmetric cryptography, the same key must be used to encrypt and decrypt data.

True

13
New cards

Isabella is a network administrator. She is researching virtual private network (VPN) options for company employees who work from home. The solution must provide encryption over public networks, including the Internet; not rely upon pathways the company owns; be reliable; and not be subject to eavesdropping. It must also be cost-effective. Which solution does she choose?

Secured VPN

14
New cards

Mazie is a network engineer designing a virtual private network (VPN) architecture. The architecture must have the ability to establish and maintain a secure link between the company's main office and a branch office over the Internet, effectively creating a single distributed LAN. What solution does she recommend be applied?

site-to-site

15
New cards

Remote control is the ability to use a local computer system to remotely take control of another computer

True

16
New cards

Resiliency is the ease with which an organization can quickly increase capacity and use or shrink capacity and use of a device, system, or network.

False

17
New cards

Side attacks against the encrypted link of a virtual private network (VPN) are nearly eliminated, while data entering or leaving the VPN is at risk.

True

18
New cards

Virtual private networks (VPNs) over the Internet can experience latency but not fragmentation.

False

19
New cards

What is a mathematical operation that is easily performed but that is highly unlikely to reverse in a reasonable amount of time?

one-way function

20
New cards

Which elements do digital certificate contain that can be used to increase the reliability of authenticity and nonrepudiation?

Digital certificates use a public key and private key pair signed by a trusted third party.

21
New cards

Which of the following is a virtual private network (VPN) encryption encapsulation method best suited for linking individual computers together, even though it does not encrypt the original IP header?

Transport

22
New cards

Which of the following is an encryption method that is very fast and is based on a single, shared key?

Symmetric

23
New cards

Which of the following statements about ciphertext is TRUE?

Properly encrypted data produces ciphertext that does not contain redundancies or recognizable patterns.

24
New cards

Which of the following statements is TRUE of encryption?

The security of the encryption relies on the key.

25
New cards

A benefit of a commercial virtual private network (VPN) solution is access to vendor support.

True

26
New cards

A best practice when troubleshooting a virtual private network (VPN) is to document processes and procedures.

True

27
New cards

A virtual private network (VPN) policy documents an organization's rules for using the VPN

True

28
New cards

A virtual private network (VPN) policy should be a part of an overall IT security policy framework to avoid duplicate or conflicting information

True

29
New cards

A virtual private network (VPN) set up in a demilitarized zone (DMZ) has a firewall in front and behind it

True

30
New cards

Analisa is a sales representative who travels extensively. At a trade show, Analisa uses her virtual private network (VPN) connection to simultaneously connect to the office LAN and her personal computer at home. What security risk does this pose?

split tunneling that can lead to hairpinning

31
New cards

In a bypass virtual private network (VPN), traffic to the VPN and from the VPN to the internal network is not firewalled

True

32
New cards

In an internally connected virtual private network (VPN), the Internet-facing VPN connection is front of a firewall.

False

33
New cards

Only hardware virtual private networks (VPNs) are vulnerable to denial of service (DoS) attacks.

False

34
New cards

Opal is the chief technology officer for her company. She is working with the legal department to acquire virtual private network (VPN) service through a cloud provider. She wants the contract to address failover specifically. What is she most likely concerned about?

The chance of the VPN breaking and wants to provide redundancy

35
New cards

Open-source virtual private network (VPN) solutions are usually less flexible than commercial solutions

False

36
New cards

Split tunneling is a configuration setting that allows simultaneous access to both an untrusted network and a secured virtual private network (VPN) network connection

True

37
New cards

Split tunneling potentially opens a door into the network that you cannot control.

True

38
New cards

Virtual private network (VPN) patches address security issues and fix bugs

Trye

39
New cards

When monitoring a virtual private network (VPN), multiple concurrent employee connections may indicate a security issue

False

40
New cards

Which of the following is a type of virtual private network (VPN) architecture that places a firewall in front of the VPN to protect it from Internet-based attacks as well as a firewall behind the VPN to protect the internal network?

DMZ architecture

41
New cards

Which of the following is one of the most common and easily exploited vulnerabilities on any hardware network device?

Default password

42
New cards

While there is no single way to troubleshoot a virtual private network (VPN) issue, what is the MOST appropriate first step?

Identify the symptoms

43
New cards

A hardware virtual private network (VPN) is a standalone device, dedicated to managing VPN functions

True

44
New cards

A software-based virtual private network (VPN) may be part of a server operating system, part of an appliance operating system, or a third-party add-on software solution

True

45
New cards

A virtualized Secure Sockets Layer (SSL) virtual private network (VPN) provides the ability to create custom authentication methods

True

46
New cards

Chad is a network engineer. He is tasked with selecting a virtual private network (VPN) platform for his company. He chooses a solution that is inexpensive and runs on UNIX, although it is less scalable and less stable than other solutions. What has he chosen?

OS-based VPN

47
New cards

Chris is a network engineer deploying a virtual private network (VPN) solution. He needs an implementation of Secure Sockets Layer/Transport Layer Security (SSL/TLS) that adds a layer of authentication to the access. What feature does he require?

Bidirectional authentication

48
New cards

Client capabilities do not affect the performance of a remote virtual private network (VPN) connection

False

49
New cards

In IPSec tunnel mode, only the data packet payload is encapsulated, while the packet header is left intact

False

50
New cards

Internet Protocol Security (IPSec) has three major components: Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE)

True

51
New cards

Internet Protocol Security (IPSec) is a standards-based protocol suite designed specifically for securing ____________ communications

Internet Protocol (IP)

52
New cards

Internet Protocol Security (IPSec) is designed to work well with network address translation (NAT).

False

53
New cards

Internet Protocol Security (IPSec) supports both transport mode and tunnel mode.

True

54
New cards

Software-based virtual private networks (VPNs) are typically more scalable than hardware VPNs.

 False

55
New cards

The higher the encryption level of a virtual private network (VPN) connection, the greater the impact on the memory and processor of the endpoint devices.

True

56
New cards

The stability of a virtual private network (VPN) connection can be affected by the number of firewalls and routers it must traverse

True

57
New cards

Which Internet Protocol Security (IPSec) core component negotiates, creates, and manages security associations?

Internet Key Exchange (IKE)

58
New cards

Which of the following is a core Internet Protocol Security (IPSec) protocol that provides encryption only, both encryption and integrity protection, or integrity protection only in all but the oldest IPSec implementations?

Encapsulating Security Payload (ESP

59
New cards

Which of the following is a protocol that replaces the use of telnet and rlogin to log in to a shell on a remote host?

Secure Shell (SSH)

60
New cards

Which of the following is an advantage of Secure Sockets Layer/Transport Layer Security (SSL/TLS) virtual private networks (VPNs) versus Internet Protocol Security (IPSec) VPNs?

No NAT problems

61
New cards

Which of the following is the protocol used with HTTPS for encrypting communications to and from websites?

Secure Sockets Layer/Transport Layer Security (SSL/TLS)

62
New cards

Which of the following statements is TRUE of an Internet Protocol Security (IPSec) virtual private network (VPN) when compared to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) VPN?

It requires client software

63
New cards

A virtual private network (VPN) implementation best practice is to protect the VPN server behind a firewall

True