Filters
Question type

IPSec uses Internet ____________ to manage the encryption keys.

Correct Answer

verifed

verified

Prior to encryption,IPSec compresses packets with ____________ compression.

Correct Answer

verifed

verified

Which is NOT likely a consideration of an administrator in determining which VPN solution to implement?


A) How packets are encrypted
B) What authentication is used
C) Whether existing hardware and software supports the technology
D) Which ISPs offer which services

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

One strength of available PPTP authentication technologies is that in addition to the initial handshaking,____________ also periodically repeats the handshake process.

Correct Answer

verifed

verified

Which was the earlier VPN technology?


A) IPSec
B) L2TP
C) PPP
D) PPTP

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which is an authentication protocol that uses a three-part handshaking procedure?


A) CHAP
B) EAP
C) PAP
D) SPAP

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 26 of 26

Related Exams

Show Answer