Page 791 - StudyBook.pdf
P. 791

Self Test Appendix • Appendix  775


                  D. IPSec is designed to function in two modes:, transport and tunnel. If you want to encrypt
                    only the data being transmitted, you set up IPSec to use transport mode.
                  Tunnel mode (A) is used to encrypt both the IP headers and the data being transferred.
                    Unauthorized state (B) is a term related to 802.1x wireless security protocol.Transfer mode
                    (C) is a fictitious term unrelated to IPSec.

                  6.  One of the biggest differences between TACACS and TACACS+ is that TACACS uses
                      _________ as its transport protocol and TACACS+ uses _________ as its transport protocol.
                      A. TCP; UDP
                      B. UDP;TCP
                      C. IP;TCP
                      D. IP; UDP
                  B.TACACS uses UDP (a connectionless-oriented protocol) for its transport protocol whereas
                    TACACS+ uses TCP (a connection-oriented protocol) for transporting data because TCP is a
                    reliable transport protocol.
                  Answer A has the correct transport protocols (TCP and UDP), but they are backwards in terms
                    of their relation to TACACS and TACACS+.Answers C and D are incorrect because the IP
                    handles addressing and routing at the network layer and relies on either TCP or UDP to handle
                    transport of data.

                  7.  The __________ protocol was created from by combining the features of PPTP and L2F.
                      A. IPSec
                      B. XTACACS
                      C. PPP
                      D. L2TP
                  D. L2TP is a hybrid of the PPTP and L2F protocols that combines the features of each.
                  IPSec (A) is used by L2TP for encryption, but was not created by combining PPTP and L2F.
                    XTACACS (B) is the second generation of the TACACS authentication protocol.PPP (C) is
                    the basis for PPTP protocol, and preexisted PPTP, L2F, and L2TP.

                  8.  SSH is concerned with the confidentiality and __________ of the information being passed
                      between the client and the host.

                      A. Integrity
                      B. Availability
                      C. Accountability
                      D. Speed










                                                                              www.syngress.com
   786   787   788   789   790   791   792   793   794   795   796