Page 180 - StudyBook.pdf
P. 180

164    Chapter 3 • Communication Security: Remote Access and Messaging

              7. The __________ protocol was created from by combining the features of
                  PPTP and L2F.

                  A. IPSec
                  B. XTACACS
                  C. PPP
                  D. L2TP


              8. SSH is concerned with the confidentiality and __________ of the informa-
                  tion being passed between the client and the host.
                  A. Integrity
                  B. Availability

                  C. Accountability
                  D. Speed

              9. IPSec is made up of two basic security protocols:The AH protocol and the
                  _________________ protocol.
                  A. SPA

                  B. IKE
                  C. ESP
                  D. EAP

              10. You are a consultant working with a high-profile client.They are concerned
                  about the possibility of sensitive e-mail being read by unauthorized persons.
                  After listening to their issues, you recommend that they implement either
                  S/MIME or PGP to _________ their messages. Select the BEST answer.
                  A. Encapsulate

                  B. Encrypt
                  C. Authorize
                  D. Identify












          www.syngress.com
   175   176   177   178   179   180   181   182   183   184   185