Which of the following is NOT a task that a VPN concentrator is responsible for?

Lesson 7 Virtualization and Cloud Computing

Quiz
•
Other
•
11th Grade
•
Hard
Christina Bright
Used 2+ times
FREE Resource
59 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A VPN concentrator authenticates VPN clients.
A VPN concentrator manages encryption for VPN transmissions.
A VPN concentrator shuts down established connections with malicious traffic occurs.
A VPN concentrator establishes tunnels for VPN connections.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
Dynamic Multipoint VPN
Auto Switched VPN Service
Symmetric VPN Autodial
Dynamic SmartVPN
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
File Transfer Protocol (FTP)
Trivial FTP (TFTP)
Secure FTP (SFTP)
FTP Secure (FTPS)
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
VNC is faster than Remote Desktop, and requires less network bandwidth.
VNC is open source, allowing companies to develop their own software based on VNC.
VNC uses the Remote Desktop Protocol (RDP).
VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In order to generate a public and private key for use with SSH, what command line utility should you use?
ssh-keygen
key-generate
ssh-newkey
gpg --ssh
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH provides a graphical view of the remote computer.
SSH does not protect against DNS spoofing
SSH does not protect against IP spoofing.
SSH supports port forwarding.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why is the telnet utility a poor choice for remote access to a device?
It provides no mechanism for authentication.
It cannot be used over a public WAN connection.
It provides poor authentication and no encryption.
It does not allow for control of a computer remotely.
Create a free account and access millions of resources
Similar Resources on Quizizz
59 questions
Chapter 12: Mobile, Linux, and macOS Operating Systems

Quiz
•
11th Grade
58 questions
МОДО 2025. 9 класс. Вариант 10 (русский язык обучения)

Quiz
•
9th Grade - University
62 questions
tema 6 CEL

Quiz
•
11th Grade
59 questions
Media and Information Literacy

Quiz
•
11th Grade
60 questions
Sports and Entertainment Marketing: Final Exam

Quiz
•
9th - 12th Grade
60 questions
FBLA Knowledge

Quiz
•
10th - 12th Grade
62 questions
Gavin review 1

Quiz
•
9th - 12th Grade
62 questions
Unit 4 Mock Test

Quiz
•
10th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Other
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University