Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

quiz-placeholder

Similar activities

Teknologi WAN XI TKJ

Teknologi WAN XI TKJ

University

20 Qs

UAS CCNA 3

UAS CCNA 3

University

20 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

VPN - QUIZ

VPN - QUIZ

University

10 Qs

NETWORKING -SWITCHING 2

NETWORKING -SWITCHING 2

University

20 Qs

Administrasi Infrastruktur Jaringan (XII) Firewall

Administrasi Infrastruktur Jaringan (XII) Firewall

University

20 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

Mod6-9

Mod6-9

University

10 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What encryption algorithm is used in site-to-site IPSec VPN configuration?

EAS 256

EAS 128

DES 256

DES 128

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What authentication method is used in your site-to-site IPSec VPN configuration?

DH 1

RSA

DES 256

pre-shared key

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What security association is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What ESP Transform Encryption is used in your site-to-site IPSec VPN configuration?

ipsec-isakmp

vpn-map

esp-aes

pre-shared key

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is command is used to enable security package in router?

license module c1900 technology-package boot securityk9

boot package module c1900 technology- securityk9

license boot module c1900 technology-package securityk9

boot package technology- securityk9 module c1900

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to configure the IKE Phase 1 ISAKMP policy on Makati?

isakmp policy crypto 10

crypto isakmp policy 10

policy 10 crypto isakmp

policy crypto isakmp 10

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What specific command is used to create the crypto map VPN-MAP that binds all of the Phase 2 parameters together in Ortigas and Makati?

10 ipsec-isakmp crypto map VPN-MAP

VPN-MAP 10 ipsec-isakmp crypto map

VPN-MAP 10 crypto map ipsec-isakmp

crypto map VPN-MAP 10 ipsec-isakmp

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?