Content
Top of Form
Assistive Technology Tips [opens in new window]
Instructions
Question Completion Status:
Question 1
In asymmetric cryptography, what does a digital signature accomplish?
Proves the identity of the sender
Confirms the source of the message
Prevents others from viewing the message
Provides confidentiality protection
Question 2
This occurs when a parent network provides filtering for traffic before it enters the child network to which individual and business customers connect.
upstream filtering
firewall filtering
edge device filtering
defensive filtering
1 points
Question 3
To reduce risk of vulnerability, some VPNs use rekeying processes. This particular type of rekeying triggers when a specific amount of traffic is transmitted.
election rekeying
volume rekeying
idle rekeying
time rekeying
Question 4
________, a sub-set of asymmetric cryptography, is based on key pairs.
digital certificate
multi-factor authentication
ciphertext
public key cryptography
Question 5
A hacker captures and retransmits authentication packets against the same server in order to gain interactive or session access to a system. This describes which type of attack?
Replay
Insertion
Buffer overflow
Hijacking
Question 6
What is an advantage of VPN tunnel mode?
Encapsulates protocol headers only
Encapsulates packet payloads only
Encapsulates protocol headers and packet payloads
Does not encapsulate any part of the packet
Question 7
A ________ allows an organization to know and control the pathway of their transmissions.
client-to-server VPN
trusted VPN
distributed LAN
host-to-site VPN
Question 8
Which of the following attacks must take maximum transmission units (MTUs) into account?
Buffer overflow
Fragmentation
Replay
Cross-site scripting