Telecommunication and Information Technology > QUESTIONS & ANSWERS > University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Lab 8 Assessmen (All)
QUESTION 1 1. Before analyzing a network packet file in Wireshark in this lab, you created a filter. What did the filter do? Deleted certain types of traffic from the packet file Displayed certai ... n types of traffic in a packet file Displayed all hex data for a packet file Added certain types of traffic to the packet file 5.00000 points QUESTION 2 1. How can FTP be made more secure? Encrypt files before transferring them. Decrypt files before transferring them. Use a graphical user interface (GUI) rather than a commandline interface. Use a command-line interface rather than a graphical user interface (GUI). 5.00000 points QUESTION 3 1. If Secure Shell (SSH) is configured to use asymmetrical encryption, which of the following statements is true? One key is required when sending data. Two keys are required when sending data. One key and a secure protocol are required to send data. Two keys and Telnet are required to send data. 5.00000 points QUESTION 4 1. In Windows, what is Trusted Root Certification Authorities? A key exchange framework The name of a default VPN connection A certificate store A folder for protocols used in secure VPN connections 5.00000 points QUESTION 5 1. In Wireshark, which of the following is true of the Hex Data pane? It displays packet information but not file names or file paths. It displays the same information as the Frame Details pane but in an easier-to-read format. It can display file contents in hexadecimal only. It can display file contents in hexadecimal and clear text. 5.00000 points QUESTION 6 1. In this lab, you removed a split tunnel configuration from an IPsec VPN adapter. What was the result? No traffic was allowed to pass through the IPsec tunnel, making the connection faster but less secure. No traffic was allowed to pass through the IPsec tunnel, making the connection faster and more secure. All traffic was forced through the IPsec tunnel, making the connection faster but less secure. All traffic was forced through the IPsec tunnel, making the connection slower but more secure. 5.00000 points QUESTION 7 1. Of the following, what is a packet retransmission most likely to indicate? An intentional packet injection A new server certificate An incorrect user password An anonymous connection 5.00000 points QUESTION 8 1. Secure Shell (SSH) protocol replaces which older, insecure protocol? L2TP Telne t FTP IPsec 5.00000 points QUESTION 9 1. What is ISAKMP? A secure Certificate Authority (CA) A file transfer application A protocol used to establish tunnels and cryptographic keys A protocol used for authorization of VPN users 5.00000 points QUESTION 10 1. What is split tunneling? Using two security protocols for a single VPN Configuring clients to access a public network through a VPN while maintaining access to local resources at the same time, using the same or different network connections Using two different VPN connections to access the same resources Configuring clients to access public networks and local resources through two different VPNs 5.00000 points QUESTION 11 1. What is the 255.255.255.255 address typically associated with? VPN client IP address VPN server IP address A mobile device network adapter Subnet mask 5.00000 points QUESTION 12 1. When configuring a VPN connection from a client to a server, what does the route add <a.b.c.d> mask 255.255.255.0 <w.x.y.z> command do? Add a route to the client's internal firewall. Add a route to the connecting IP address of the IPsec firewall. Masks the IP address of the IPsec firewall. Masks the source's network address. 5.00000 points QUESTION 13 1. When creating a VPN client in Windows, which of the following is not an option when selecting the type of VPN? Point to Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol with IPsec (L2TP/IPsec) IKEv2 Extensible Authentication Protocol (EAP) 5.00000 points QUESTION 14 1. Which Windows feature do you use to create a VPN client? Internet Options Windows Firewall Certificate Manager Network and Sharing Center 5.00000 points QUESTION 15 1. Which of the following statements is NOT true of Secure Shell (SSH)? SSH encrypts files during the file transfer process. You can use SSH with FTP. An attacker who gains access to SSH encryption keys can decrypt and read content. An attacker who gains access to SSH encryption keys cannot decrypt and read content. 5.00000 points QUESTION 16 1. Which of the following statements is NOT true regarding VPNs? VPN tunnels are not 100% secure. A client using a VPN tunnel is vulnerable to inline attacks. A VPN does not mask a client's IP address. The code of an inline attack can reveal a client system's IP address. 5.00000 points QUESTION 17 1. Which of the following statements is true of split tunnel configurations? Clients do not keep local traffic on their own network. Clients cannot route IPsec traffic through the VPN tunnel. The configuration is optimal for performance. The configuration is more secure than specifying a network address. 5.00000 points QUESTION 18 1. Which type of files are most appropriate to exchange via anonymous FTP? Code files for a software manufacturer's application A company's sales data A company's marketing literature Customer database files 5.00000 points QUESTION 19 1. You are configuring a VPN client on a Windows 2016 server using IPsec to create a secure tunnel to a L2TP\IPsec server. Which of the following statements is true? L2TP does not perform encryption. L2TP performs encryption. L2TP works only for IP networks, not non-IP networks. L2TP works only for non-IP networks, not non-IP networks. 5.00000 points QUESTION 20 1. You just set up a VPN client on a Windows computer to work with a pfSense VPN server. You now want to make an IPsec connection to the server using IKEv2. What is the first step you must take? Import a certificate file from the pfSense system. Authenticate with the pfSense server. Revoke a certificate from the pfSense server Certificate Authority (CA). Add a route to the connecting IP address of the IPsec firewall. [Show More]
Last updated: 3 years ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
University of the Cumberlands EMISS ISOL532 Telecommunications and network security. Chapter 1 and 2 Exam. 30 Q&A University of the Cumberlands EMISS ISOL532 Telecommunications and network security...
By Kirsch 3 years ago
$69
23
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 09, 2022
Number of pages
5
Written in
All
This document has been written for:
Uploaded
Aug 09, 2022
Downloads
0
Views
135
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·