Page 791 - StudyBook.pdf
P. 791
Self Test Appendix • Appendix 775
D. IPSec is designed to function in two modes:, transport and tunnel. If you want to encrypt
only the data being transmitted, you set up IPSec to use transport mode.
Tunnel mode (A) is used to encrypt both the IP headers and the data being transferred.
Unauthorized state (B) is a term related to 802.1x wireless security protocol.Transfer mode
(C) is a fictitious term unrelated to IPSec.
6. One of the biggest differences between TACACS and TACACS+ is that TACACS uses
_________ as its transport protocol and TACACS+ uses _________ as its transport protocol.
A. TCP; UDP
B. UDP;TCP
C. IP;TCP
D. IP; UDP
B.TACACS uses UDP (a connectionless-oriented protocol) for its transport protocol whereas
TACACS+ uses TCP (a connection-oriented protocol) for transporting data because TCP is a
reliable transport protocol.
Answer A has the correct transport protocols (TCP and UDP), but they are backwards in terms
of their relation to TACACS and TACACS+.Answers C and D are incorrect because the IP
handles addressing and routing at the network layer and relies on either TCP or UDP to handle
transport of data.
7. The __________ protocol was created from by combining the features of PPTP and L2F.
A. IPSec
B. XTACACS
C. PPP
D. L2TP
D. L2TP is a hybrid of the PPTP and L2F protocols that combines the features of each.
IPSec (A) is used by L2TP for encryption, but was not created by combining PPTP and L2F.
XTACACS (B) is the second generation of the TACACS authentication protocol.PPP (C) is
the basis for PPTP protocol, and preexisted PPTP, L2F, and L2TP.
8. SSH is concerned with the confidentiality and __________ of the information being passed
between the client and the host.
A. Integrity
B. Availability
C. Accountability
D. Speed
www.syngress.com