Ragavendhar Week 5 Quiz

docx

School

Kenyatta University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by stevebia77

Report
Week 5 Quiz Content Assistive Technology Tips [opens in new window] Test Information Instructions Description Week 5 Assignment Instructions Week 5 Assignment Timed Test This test has a time limit of 20 minutes.This test will save and submit automatically when the time expires. Warnings appear when half the time , 5 minutes , 1 minute , and 30 seconds remain. Multiple Attempts Not allowed. This test can only be taken once. Force Completion This test can be saved and resumed at any point until time has expired. The timer will continue to run if you leave the test. Your answers are saved automatically. Remaining Time: 07 minutes, 33 seconds. Question 1 1. Which of the following is an encryption method that is very fast and is based on a single, shared key? Asymmetric Ciphertext Hashing Symmetric 2 points
Question 2 1. A host-to-host VPN is a direct VPN connection between one host and another. True False 2 points Question 3 1. Which of the following is a virtual private network (VPN) encryption encapsulation method best suited for linking individual computers together, even though it does not encrypt the original IP header? Cryptography Ciphertext Transport Tunnel 2 points Question 4 1. A VPN creates or simulates a network connection over an intermediary network. True False 2 points Question 5 1. A dedicated leased line is an alternative to a virtual private network (VPN) between two office locations.
True False 2 points Question 6 1. Diego is a network consultant. He is explaining the benefits of virtual private network (VPN) connections for remote clients to the owner of a company who wants to allow most staff to work remotely. He says that a VPN is both private and secure. What does he say allows for this? Authentication provides privacy and security Encryption provides privacy and security Authentication provides privacy and encryption provides security Encryption provides privacy and authentication provides security 2 points Question 7 1. A remote access link enables access to network resources using a wide area network (WAN) link to connect to the geographically distant network. True False 2 points Question 8 1. Effective virtual private network (VPN) policies clearly define security restrictions imposed on VPNs. True
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
False 2 points Question 9 1. In symmetric cryptography, the same key must encrypt and decrypt data. True False 2 points Question 10 1. Which of the following virtual private network (VPN) policy requirements is valid? Impose strict single-factor authentication. Avoid strong access control restrictions on the primary VPN connection. Define the mechanisms that provide remote technical support for VPN telecommuters. Disable detailed auditing as it introduces a security concern.