
IPSEC review
Authored by Angel Martinez
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network. Which of the following protocols would you recommend? (Select two.)
Secure File Transfer Protocol (SFTP)
Secure Copy (SCP)
Remote Copy Protocol (RCP)
File Transfer Protocol (FTP)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols uses port 443?
Hyper Text Transfer Protocol Secure (HTTPS)
Secure Hypertext Transfer Protocol (S-HTTP)
S/MIME (Secure/Multipurpose internet Mail Extensions)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sub-layer for security?
Hypertext Transfer Protocol Secure (HTTPS)
Secure Shell Protocol (SSH)
Domain Name System (DNS)
Simple Mail Transfer Protocol
(SMTP)
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following tools allow remote management of servers? (Select two.)
Telnet
SSH
Secure Socket Layer (SSL)
File Transfer Protocol (FTP)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
SFTP uses which mechanism to provide security for authentication and data transfer?
Secure Shell Protocol (SSH)
Secure Shell (SSH)
Internet Protocol Security (IPsec)
Token devices
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When using SSL authentication, what does the client verify first when checking a server's identity?
The current date and time must fall within the server's certificate-validity period.
Master secrets are verifiable from asymmetric keys.
The certificate must be non-expiring and self-signed by the sysadmin.
All DNS resolution must point to the corporate intranet routers.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Hyper Text Transport Protocol Secure
(HTTPS)
Simple Mail Transfer Protocol
(SMTP)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?