Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

quiz-placeholder

Similar activities

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

administrasi sistem jaringann

administrasi sistem jaringann

11th Grade - Professional Development

12 Qs

CT Week 4 Computer Networking

CT Week 4 Computer Networking

University

16 Qs

UAS CCNA 3

UAS CCNA 3

University

20 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Mod6-9

Mod6-9

University

10 Qs

Emerging technologies

Emerging technologies

6th Grade - University

10 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What encryption algorithm is used in site-to-site IPSec VPN configuration?

EAS 256

EAS 128

DES 256

DES 128

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What authentication method is used in your site-to-site IPSec VPN configuration?

DH 1

RSA

DES 256

pre-shared key

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What security association is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What ESP Transform Encryption is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is command is used to enable security package in router?

license module c1900 technology-package boot securityk9

boot package module c1900 technology- securityk9

license boot module c1900 technology-package securityk9

boot package technology- securityk9 module c1900

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to configure the IKE Phase 1 ISAKMP policy on Makati?

isakmp policy crypto 10

crypto isakmp policy 10

policy 10 crypto isakmp

policy crypto isakmp 10

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to create the crypto map VPN-MAP that binds all of the Phase 2 parameters together in Ortigas and Makati?

10 ipsec-isakmp crypto map VPN-MAP

VPN-MAP 10 ipsec-isakmp crypto map

VPN-MAP 10 crypto map ipsec-isakmp

crypto map VPN-MAP 10 ipsec-isakmp

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?