Question: Question 18 Four of the eight basic security techniques are, Hashing, Encryption, Digital Certificates, Spoofing Hashing, Encryption, Virtual Private Networks, Deep Packet Inspection Encryption, Digital
Question 18
Four of the eight basic security techniques are,
| | Hashing, Encryption, Digital Certificates, Spoofing |
| | Hashing, Encryption, Virtual Private Networks, Deep Packet Inspection |
| | Encryption, Digital signatures, Firewalls, Virtual Local Area Networks |
| | Virtual Private Networks, Virtual Local Area Networks, Trunking, Firewalls |
Question 19
NAT is especially useful at a residence or small business because,
| | It separates all devices on a network by assigning a prefix to the IP address |
| | It provides security measures to prevent others from reading the MAC addresses of individual devices |
| | It allows a set of computers to share the connection without additional purchases of IP addresses |
| | It is plug-and-play, thereby reducing cost of ownership and expands limited bandwidth |
Question 20
Can ARP be used on a network that does not provide broadcast? Why or why not?
| | Yes, if the ARP response has already been received and/or programmed in cache |
| | Yes, this process is automatically completed by the router without LAN broadcast |
| | No, ARP requires all incoming messages to be broadcast to determine routing |
| | No, if the ARP response is not already in cache |
Question 21
What are the three ways a VPN can encrypt data for transmission across the Internet?
| | Payload encryption, IP-in-IP tunneling, IP-in-TCP tunneling |
| | Payload encryption, IP-in-IP tunneling, Latency tunneling |
| | IP-in-TCP tunneling, Latency tunneling, Header encryption |
| | IP-in-IP tunneling, Header encryption, Payload encryption |
Question 22
When a router uses a forwarding table to look up a next-hop address, the result is an IP address. What must happen before the datagram can be sent?
| | Destination address is extracted from the packet |
| | Address is given a packet switch number (P) and computer identification (C) |
| | Packet switch number (P) is compared to computer identification (C) |
| | If the packet number is same as the computer identification, it is sent to local destination |
| | If the packet number is different than the packet switch, it goes to the next hop |