100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 263 Final Pt 2 | Verified with 100% Correct Answers $18.99   Add to cart

Exam (elaborations)

ITN 263 Final Pt 2 | Verified with 100% Correct Answers

 12 views  0 purchase
  • Course
  • ITN 263
  • Institution
  • ITN 263

ITN 263 Final Pt 2 | Verified with 100% Correct Answers Which layer of the OSI model is the Data Link Layer? Layer 2 Chad is a network engineer. He is tasked with selecting a virtual private network (VPN) platform for his company. He chooses a solution that is inexpensive and runs on UNIX, althou...

[Show more]

Preview 3 out of 16  pages

  • August 4, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 263
  • ITN 263
avatar-seller
Bri254
ITN 263 Final Pt 2


Which layer of the OSI model is the Data Link Layer?
Layer 2

Chad is a network engineer. He is tasked with selecting a virtual private network (VPN)
platform for his company. He chooses a solution that is inexpensive and runs on UNIX,
although it is less scalable and less stable than other solutions. What has he chosen?
Operating system-based VPN

Your sales department likes to stream professional sports games across the computer
network on Wednesday afternoons, causing VPN performance issues during that time.
What is the most likely cause of the performance issues?
Traffic spike

Felicia is a network engineer deploying a virtual private network (VPN) solution. The
VPN operates using Secure Shell (SSH). When asked by a new help desk tec h about
which layer of the OSI model it employs, how does Felicia answer?
7

Internet Protocol Security (IPSec) is a standards-based protocol suite designed
specifically for securing ____________ communications.
Internet Protocol (IP)

Which of the following can perform authentication to provide integrity protection for the
outermost IP header?
Authentication Header (AH)

Which of the following provides integrity protection for packet headers and data and can
optionally provide replay protection and access protection?
Authentication Header (AH)

Maria is a new network engineer for a company that was established more than 30
years ago. She is examining the IT infrastructure and discovers that the virtual private
network (VPN) solution employs an older encryption protocol for backward compatibility.
This protocol has largely been replaced, but it used to be popular in early VPN
solutions. What is this protocol?
Layer 2 Tunneling Protocol (L2TP)

Which of the following is a protocol that supports Advanced Encryption Standard (AES)
with 128, 192, and 256 keys?
Transport Layer Security (TLS)

,Chris is a network engineer deploying a virtual private network (VPN) solution. He
needs an implementation of Secure Sockets Layer/Transport Layer Security (SSL/TLS)
that adds a layer of authentication to the access. What feature does he require?
Bidirectional authentication

Which of the following statements is TRUE of an Internet Protocol Security (IPSec)
virtual private network (VPN) when compared to a Secure Sockets Layer/Transport
Layer Security (SSL/TLS) VPN?
It requires client software

Which of the following is a protocol that replaces the use of telnet and rlogin to log in to
a shell on a remote host?
Secure Shell (SSH)

Mei is a new network technician for a mid-sized company. She is trying to determine
what is causing a performance lag on the infrastructure's virtual private network (VPN).
The lags typically occur between 8 a.m. and 9 a.m., and again between 1 p.m. and 2
p.m. What is the most likely cause?
Peak usage loads

The configuration, location, software version, and underlying operating system of a
virtual private network (VPN) are all factors that are most likely to affect:
Stability

Virtual private networks (VPNs) and which standard have historically suffered from
conflicts when used together?
Network Address Translation (NAT)

Which of the following is an advantage of Secure Sockets Layer/Transport Layer
Security (SSL/TLS) virtual private networks (VPNs) versus Internet Protocol Security
(IPSec) VPNs?
No NAT problems

The IT department of a company has just rolled out a virtual private network (VPN)
solution that offers greater flexibility, delegation of management, and added security
over the previous implementation. What is this solution called?
Secure Sockets Layer (SSL) virtualization

Which of the following is a core Internet Protocol Security (IPSec) protocol that provides
encryption only, both encryption and integrity protection, or integrity protection only in all
but the oldest IPSec implementations?
Encapsulating Security Payload (ESP)

Which Internet Protocol Security (IPSec) core component negotiates, creates, and
manages security associations?
Internet Key Exchange (IKE)

, Which of the following is the protocol used with HTTPS for encrypting communications
to and from websites?
Secure Sockets Layer/Transport Layer Security (SSL/TLS)

A software-based virtual private network (VPN) may be part of a server operating
system, part of an appliance operating system, or a third-party add-on software solution.
True

A hardware virtual private network (VPN) is a standalone device, dedicated to managing
VPN functions.
True

The functionalities of software and hardware virtual private network (VPN) solutions are
fundamentally different.
False

Software-based virtual private networks (VPNs) are typically more scalable than
hardware VPNs.
False

Layer 2 of the Open Systems Interconnection (OSI) Reference Model is the Data Link
Layer.
True

The Network Layer of the Open Systems Interconnection (OSI) Reference Model is the
protocol layer that transfers data between adjacent network nodes.
False

Internet Protocol Security (IPSec) has three major components: Authentication Header
(AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE).
True

Authentication Header (AH) provides integrity protection for packet headers and data,
as well as user authentication.
True

Internet Protocol Security (IPSec) supports both transport mode and tunnel mode.
True

The Secure Shell (SSH) protocol is a method for secure remote login and other secure
network services over a public network.
True

In IPSec tunnel mode, only the data packet payload is encapsulated, while the packet
header is left intact.
False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73773 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.99
  • (0)
  Add to cart