Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

quiz-placeholder

Similar activities

Virtual Private Network ( VPN )

Virtual Private Network ( VPN )

University

14 Qs

Security IPSec

Security IPSec

University

10 Qs

Project Kappa (D)

Project Kappa (D)

University

12 Qs

Puertos TCP/UDP

Puertos TCP/UDP

10th Grade - University

16 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

19 Qs

INTRODUCCION A LA CRIPTOGRAFIA

INTRODUCCION A LA CRIPTOGRAFIA

University

14 Qs

Module 9 (Fundamentals of Cybersecurity)

Module 9 (Fundamentals of Cybersecurity)

University

10 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What encryption algorithm is used in site-to-site IPSec VPN configuration?

EAS 256

EAS 128

DES 256

DES 128

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What authentication method is used in your site-to-site IPSec VPN configuration?

DH 1

RSA

DES 256

pre-shared key

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What security association is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What ESP Transform Encryption is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is command is used to enable security package in router?

license module c1900 technology-package boot securityk9

boot package module c1900 technology- securityk9

license boot module c1900 technology-package securityk9

boot package technology- securityk9 module c1900

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to configure the IKE Phase 1 ISAKMP policy on Makati?

isakmp policy crypto 10

crypto isakmp policy 10

policy 10 crypto isakmp

policy crypto isakmp 10

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to create the crypto map VPN-MAP that binds all of the Phase 2 parameters together in Ortigas and Makati?

10 ipsec-isakmp crypto map VPN-MAP

VPN-MAP 10 ipsec-isakmp crypto map

VPN-MAP 10 crypto map ipsec-isakmp

crypto map VPN-MAP 10 ipsec-isakmp

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?