Question: Question 18 Four of the eight basic security techniques are, Hashing, Encryption, Digital Certificates, Spoofing Hashing, Encryption, Virtual Private Networks, Deep Packet Inspection Encryption, Digital

Question 18

Four of the eight basic security techniques are,

Hashing, Encryption, Digital Certificates, Spoofing
Hashing, Encryption, Virtual Private Networks, Deep Packet Inspection
Encryption, Digital signatures, Firewalls, Virtual Local Area Networks
Virtual Private Networks, Virtual Local Area Networks, Trunking, Firewalls

Question 19

NAT is especially useful at a residence or small business because,

It separates all devices on a network by assigning a prefix to the IP address
It provides security measures to prevent others from reading the MAC addresses of individual devices
It allows a set of computers to share the connection without additional purchases of IP addresses
It is plug-and-play, thereby reducing cost of ownership and expands limited bandwidth

Question 20

Can ARP be used on a network that does not provide broadcast? Why or why not?

Yes, if the ARP response has already been received and/or programmed in cache
Yes, this process is automatically completed by the router without LAN broadcast
No, ARP requires all incoming messages to be broadcast to determine routing
No, if the ARP response is not already in cache
Both a and d
None of the above

Question 21

What are the three ways a VPN can encrypt data for transmission across the Internet?

Payload encryption, IP-in-IP tunneling, IP-in-TCP tunneling
Payload encryption, IP-in-IP tunneling, Latency tunneling
IP-in-TCP tunneling, Latency tunneling, Header encryption
IP-in-IP tunneling, Header encryption, Payload encryption

Question 22

When a router uses a forwarding table to look up a next-hop address, the result is an IP address. What must happen before the datagram can be sent?

Destination address is extracted from the packet
Address is given a packet switch number (P) and computer identification (C)
Packet switch number (P) is compared to computer identification (C)
If the packet number is same as the computer identification, it is sent to local destination
If the packet number is different than the packet switch, it goes to the next hop
All of the above
None of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!