Quiz 16B: Compare and Contrast Remote Access Methods

Quiz 16B: Compare and Contrast Remote Access Methods

Professional Development

25 Qs

quiz-placeholder

Similar activities

KSK SVM Revision 1

KSK SVM Revision 1

Professional Development

21 Qs

Cee-Aeh

Cee-Aeh

KG - Professional Development

30 Qs

d2quiz

d2quiz

Professional Development

20 Qs

Well-known Ports

Well-known Ports

KG - Professional Development

26 Qs

Morefine

Morefine

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

Security Plus Ports

Security Plus Ports

Professional Development

28 Qs

A+ - 19A -

A+ - 19A -

Professional Development

21 Qs

Quiz 16B: Compare and Contrast Remote Access Methods

Quiz 16B: Compare and Contrast Remote Access Methods

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Eric Jones

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol works at the Data Link layer (Layer 2) and is used to encapsulate IP packets for transmission over serial digital lines?

IPsec

TLS

PPP

GRE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is often used in conjunction with Generic Routing Encapsulation (GRE) to provide security in a VPN solution?

TLS

IPsec

AH

ESP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN topology involves a VPN client connecting over the public network to a VPN gateway positioned on the edge of the local network?

Site-to-site VPN

Hub and spoke VPN

Client-to-site VPN

Dynamic multipoint VPN

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is used for remote desktop connections, allowing an administrator to configure a server or a user to operate a computer remotely?

SSH

RDP

TLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN topology connects two or more private networks, allowing traffic to be tunneled between them automatically?

Site-to-site VPN

Hub and spoke VPN

Client-to-site VPN

Dynamic multipoint VPN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the Internet Key Exchange (IKE) protocol in IPsec?

To encrypt IP packets

To establish a trust relationship between VPN gateways

To encapsulate IP packets

To assign IP addresses to hosts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of IPsec is used for securing communications between hosts on a private network?

Transport mode

Tunnel mode

Encapsulation mode

Authentication mode

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?