Ragavendhar Week 5 Quiz
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by stevebia77
Week 5 Quiz
Content
Assistive Technology Tips [opens in new window]
Test Information
Instructions
Description
Week 5 Assignment
Instructions
Week 5 Assignment
Timed Test
This test has a time limit of 20 minutes.This test will save and submit
automatically when the time expires.
Warnings appear when
half the time
,
5 minutes
,
1 minute
, and
30 seconds
remain.
Multiple
Attempts
Not allowed. This test can only be taken once.
Force
Completion
This test can be saved and resumed at any point until time has expired. The
timer will continue to run if you leave the test.
Your answers are saved automatically.
Remaining Time:
07 minutes, 33 seconds.
Question 1
1.
Which of the following is an encryption method that is very fast and is based on a single,
shared key?
Asymmetric
Ciphertext
Hashing
Symmetric
2 points
Question 2
1.
A host-to-host VPN is a direct VPN connection between one host and another.
True
False
2 points
Question 3
1.
Which of the following is a virtual private network (VPN) encryption encapsulation
method best suited for linking individual computers together, even though it does not
encrypt the original IP header?
Cryptography
Ciphertext
Transport
Tunnel
2 points
Question 4
1.
A VPN creates or simulates a network connection over an intermediary network.
True
False
2 points
Question 5
1.
A dedicated leased line is an alternative to a virtual private network (VPN) between two
office locations.
True
False
2 points
Question 6
1.
Diego is a network consultant. He is explaining the benefits of virtual private network
(VPN) connections for remote clients to the owner of a company who wants to allow
most staff to work remotely. He says that a VPN is both private and secure. What does he
say allows for this?
Authentication provides privacy and security
Encryption provides privacy and security
Authentication provides privacy and encryption provides security
Encryption provides privacy and authentication provides security
2 points
Question 7
1.
A remote access link enables access to network resources using a wide area network
(WAN) link to connect to the geographically distant network.
True
False
2 points
Question 8
1.
Effective virtual private network (VPN) policies clearly define security restrictions
imposed on VPNs.
True
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
False
2 points
Question 9
1.
In symmetric cryptography, the same key must encrypt and decrypt data.
True
False
2 points
Question 10
1.
Which of the following virtual private network (VPN) policy requirements is valid?
Impose strict single-factor authentication.
Avoid strong access control restrictions on the primary VPN connection.
Define the mechanisms that provide remote technical support for VPN
telecommuters.
Disable detailed auditing as it introduces a security concern.