Chapter 7 Flashcards

1
Q
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
A) IaaS
B) PaaS
C) SaaS
D) XaaS
A

A) IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
A) IaaS
B) SaaS
C) XaaS
D) PaaS
A

B) SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is NOT an encryption algorithm used by SSH?
A) SHA-2
B) DES
C) RSA
D) Kerberos
A

A) SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
The SSH service listens on what TCP port?
A) 20
B) 21
C) 22
D) 23
A

C) 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
A) 128 bit
B) 160 bit
C) 256 bit
D) 512 bit
A

B) 160 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers? 
A) MS-CHAP
B) MS-CHAPv2
C) EAP
D) TKIP
A

C) EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?
A) in an authorization file under your home directory on your computer.
B) in an authorization file on the host where the SSH server is.
C) in the /etc/ssh/keys folder.
D) in the /var/run/ssh/public folder.

A

B) in an authorization file on the host where the SSH server is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What security principle provides proof of delivery and proof of the senders identity?
A) utility 
B) integrity 
C) availability 
D) non-repudiation
A

D) non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The combination of a public key and a private key are known by what term below?
A) key set
B) key team
C) key pair
D) key tie
A

C) key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Digital certificates are used by organizations known as what term below?
A) certification authorities 
B) certification registrars 
C) identity verifiers
D) certification exchanges
A

A) certification authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What security encryption protocol requires regular reestablishment of a connection and can be used with any type of TCP/IP transmission? 
A) L2TP
B) TLS
C) IPsec
D) SSL
A

C) IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
At what layer of the OSI model does the IPsec encryption protocol operate?
A) Physical layer
B) Network layer
C) Transport layer
D) Application layer
A

B) Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
The PPP headers and trailers used to create a PPP frame that encapsulates network layer packets vary between 8 and 10 fights in size due to what field?
A) priority 
B) FCS
C) FEC
D) encryption
A

B) FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
A) VPN proxy 
B) VPN server
C) VPN transport 
D) VPN gateway
A

D) VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
A) VMware vSphere
B) Oracle VirtualBox
C) Parallels
D) Citrix Xen
A

D) Citrix Xen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What protocol below is a Microsoft proprietary protocol first available in windows vista?
A) L2TP
B) PPTP
C) TTLS
D) SSTP
A

D) SSTP

17
Q
What authentication protocol sends authentication information in cleartext without encryption?
A) PAP
B) MS-CHAP
C) MS-CHAPv2
D) EAP
A

A) PAP

18
Q
How often should administrators and network users be required to change their password?
A) 60 days
B) 90 days
C) 120 days
D) 180 days
A

A) 60 days

19
Q
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
A) Kerberos
B) TKIP
C) AES
D) EAP
A

B) TKIP

20
Q
A securID keychain fob from RSA security generates a password that changes how often?
A) every 20 seconds
B) every 30 seconds
C) every 60 seconds
D) every 70 seconds
A

C) every 60 seconds

21
Q
What 2 protocols below are data link layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
A) OpenVPN
B) SLIP
C) PPTP
D) PPP
A

B) SLIP

D) PPP

22
Q
What two different types of encryption can be used by IPsec during data transfer?
A) Secure Sockets Layer (SSL)
B) Authentication Header (AH)
C) Encapsulating Security Payload (ESP)
D) Advanced Encryption Standard (AES)
A

B) Authentication Header (AH)

C) Encapsulating Security Payload (ESP)

23
Q

The key management phase of IPsec is reliant on which two services below?
A) internet key exchange (IKE)
B) internet security association and key management protocol (ISAKMP)
C) authentication header (ah)
D) encapsulating security payload (ESP)

A

A) internet key exchange (IKE)

B) internet security association and key management protocol (ISAKMP)

24
Q
What two key lengths are the most popular for the SHA – 2 hashing algorithm?
A) 160
B) 256
C) 512
D) 1024
A

B) 256

C) 512

25
Q
What two options below are AAA services?
A) openSSH
B) OpenVPN
C) RADIUS 
D) TACACS+
A

C) RADIUS

D) TACACS+