Quiz 16B: Compare and Contrast Remote Access Methods

Quiz 16B: Compare and Contrast Remote Access Methods

Professional Development

25 Qs

quiz-placeholder

Similar activities

Information and cyber security Quiz.

Information and cyber security Quiz.

Professional Development

25 Qs

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

A+ - 6A - Summarize Services Provided by Networked Hosts

A+ - 6A - Summarize Services Provided by Networked Hosts

Professional Development

22 Qs

Профессионалы 09.02.06 (Сетевое и системное администрирование)

Профессионалы 09.02.06 (Сетевое и системное администрирование)

Professional Development

24 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

ICEBERG_Assessment_Pre

ICEBERG_Assessment_Pre

University - Professional Development

23 Qs

Module 11

Module 11

9th Grade - Professional Development

20 Qs

Part 1.4

Part 1.4

Professional Development

20 Qs

Quiz 16B: Compare and Contrast Remote Access Methods

Quiz 16B: Compare and Contrast Remote Access Methods

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Eric Jones

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol works at the Data Link layer (Layer 2) and is used to encapsulate IP packets for transmission over serial digital lines?

IPsec

TLS

PPP

GRE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is often used in conjunction with Generic Routing Encapsulation (GRE) to provide security in a VPN solution?

TLS

IPsec

AH

ESP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN topology involves a VPN client connecting over the public network to a VPN gateway positioned on the edge of the local network?

Site-to-site VPN

Hub and spoke VPN

Client-to-site VPN

Dynamic multipoint VPN

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol is used for remote desktop connections, allowing an administrator to configure a server or a user to operate a computer remotely?

SSH

RDP

TLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VPN topology connects two or more private networks, allowing traffic to be tunneled between them automatically?

Site-to-site VPN

Hub and spoke VPN

Client-to-site VPN

Dynamic multipoint VPN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of the Internet Key Exchange (IKE) protocol in IPsec?

To encrypt IP packets

To establish a trust relationship between VPN gateways

To encapsulate IP packets

To assign IP addresses to hosts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of IPsec is used for securing communications between hosts on a private network?

Transport mode

Tunnel mode

Encapsulation mode

Authentication mode

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?