ITN 263 Final Pt 2 | Verified with 100% Correct Answers
13 views 0 purchase
Course
ITN 263
Institution
ITN 263
ITN 263 Final Pt 2 | Verified with 100% Correct Answers Which layer of the OSI model is the Data Link Layer? Layer 2 Chad is a network engineer. He is tasked with selecting a virtual private network (VPN) platform for his company. He chooses a solution that is inexpensive and runs on UNIX, althou...
Which layer of the OSI model is the Data Link Layer?
Layer 2
Chad is a network engineer. He is tasked with selecting a virtual private network (VPN)
platform for his company. He chooses a solution that is inexpensive and runs on UNIX,
although it is less scalable and less stable than other solutions. What has he chosen?
Operating system-based VPN
Your sales department likes to stream professional sports games across the computer
network on Wednesday afternoons, causing VPN performance issues during that time.
What is the most likely cause of the performance issues?
Traffic spike
Felicia is a network engineer deploying a virtual private network (VPN) solution. The
VPN operates using Secure Shell (SSH). When asked by a new help desk tec h about
which layer of the OSI model it employs, how does Felicia answer?
7
Internet Protocol Security (IPSec) is a standards-based protocol suite designed
specifically for securing ____________ communications.
Internet Protocol (IP)
Which of the following can perform authentication to provide integrity protection for the
outermost IP header?
Authentication Header (AH)
Which of the following provides integrity protection for packet headers and data and can
optionally provide replay protection and access protection?
Authentication Header (AH)
Maria is a new network engineer for a company that was established more than 30
years ago. She is examining the IT infrastructure and discovers that the virtual private
network (VPN) solution employs an older encryption protocol for backward compatibility.
This protocol has largely been replaced, but it used to be popular in early VPN
solutions. What is this protocol?
Layer 2 Tunneling Protocol (L2TP)
Which of the following is a protocol that supports Advanced Encryption Standard (AES)
with 128, 192, and 256 keys?
Transport Layer Security (TLS)
,Chris is a network engineer deploying a virtual private network (VPN) solution. He
needs an implementation of Secure Sockets Layer/Transport Layer Security (SSL/TLS)
that adds a layer of authentication to the access. What feature does he require?
Bidirectional authentication
Which of the following statements is TRUE of an Internet Protocol Security (IPSec)
virtual private network (VPN) when compared to a Secure Sockets Layer/Transport
Layer Security (SSL/TLS) VPN?
It requires client software
Which of the following is a protocol that replaces the use of telnet and rlogin to log in to
a shell on a remote host?
Secure Shell (SSH)
Mei is a new network technician for a mid-sized company. She is trying to determine
what is causing a performance lag on the infrastructure's virtual private network (VPN).
The lags typically occur between 8 a.m. and 9 a.m., and again between 1 p.m. and 2
p.m. What is the most likely cause?
Peak usage loads
The configuration, location, software version, and underlying operating system of a
virtual private network (VPN) are all factors that are most likely to affect:
Stability
Virtual private networks (VPNs) and which standard have historically suffered from
conflicts when used together?
Network Address Translation (NAT)
Which of the following is an advantage of Secure Sockets Layer/Transport Layer
Security (SSL/TLS) virtual private networks (VPNs) versus Internet Protocol Security
(IPSec) VPNs?
No NAT problems
The IT department of a company has just rolled out a virtual private network (VPN)
solution that offers greater flexibility, delegation of management, and added security
over the previous implementation. What is this solution called?
Secure Sockets Layer (SSL) virtualization
Which of the following is a core Internet Protocol Security (IPSec) protocol that provides
encryption only, both encryption and integrity protection, or integrity protection only in all
but the oldest IPSec implementations?
Encapsulating Security Payload (ESP)
Which Internet Protocol Security (IPSec) core component negotiates, creates, and
manages security associations?
Internet Key Exchange (IKE)
, Which of the following is the protocol used with HTTPS for encrypting communications
to and from websites?
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
A software-based virtual private network (VPN) may be part of a server operating
system, part of an appliance operating system, or a third-party add-on software solution.
True
A hardware virtual private network (VPN) is a standalone device, dedicated to managing
VPN functions.
True
The functionalities of software and hardware virtual private network (VPN) solutions are
fundamentally different.
False
Software-based virtual private networks (VPNs) are typically more scalable than
hardware VPNs.
False
Layer 2 of the Open Systems Interconnection (OSI) Reference Model is the Data Link
Layer.
True
The Network Layer of the Open Systems Interconnection (OSI) Reference Model is the
protocol layer that transfers data between adjacent network nodes.
False
Internet Protocol Security (IPSec) has three major components: Authentication Header
(AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE).
True
Authentication Header (AH) provides integrity protection for packet headers and data,
as well as user authentication.
True
Internet Protocol Security (IPSec) supports both transport mode and tunnel mode.
True
The Secure Shell (SSH) protocol is a method for secure remote login and other secure
network services over a public network.
True
In IPSec tunnel mode, only the data packet payload is encapsulated, while the packet
header is left intact.
False
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $18.99. You're not tied to anything after your purchase.