Page 180 - StudyBook.pdf
P. 180
164 Chapter 3 • Communication Security: Remote Access and Messaging
7. The __________ protocol was created from by combining the features of
PPTP and L2F.
A. IPSec
B. XTACACS
C. PPP
D. L2TP
8. SSH is concerned with the confidentiality and __________ of the informa-
tion being passed between the client and the host.
A. Integrity
B. Availability
C. Accountability
D. Speed
9. IPSec is made up of two basic security protocols:The AH protocol and the
_________________ protocol.
A. SPA
B. IKE
C. ESP
D. EAP
10. You are a consultant working with a high-profile client.They are concerned
about the possibility of sensitive e-mail being read by unauthorized persons.
After listening to their issues, you recommend that they implement either
S/MIME or PGP to _________ their messages. Select the BEST answer.
A. Encapsulate
B. Encrypt
C. Authorize
D. Identify
www.syngress.com