Correct Answer
verified
View Answer
Multiple Choice
A) Layer 2 Tunneling Protocol (L2TP)
B) Point-to-Point Tunneling Protocol (PPTP)
C) Generic Routing Encapsulation (GRE)
D) OpenVPN
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) PPP can negotiate and establish a connection between two endpoints.
B) PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client.
C) PPP can support several Network layer protocols, such as IP, that might use the connection.
D) PPP can support strong encryption, such as AH or ESP.
Correct Answer
verified
Multiple Choice
A) host-only mode
B) bridged mode
C) NAT mode
D) lockdown mode
Correct Answer
verified
Multiple Choice
A) The vNIC will its own IP address on the physical LAN.
B) The vNIC will be assigned a NAT-ed IP address.
C) The vNIC will only be able to communicate across the bridge to the host PC.
D) The vNIC will utilize the host PC's IP address.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) public-key organization
B) certified infrastructure
C) public-key infrastructure
D) symmetric identification
Correct Answer
verified
Multiple Choice
A) Dynamic Multipoint VPN
B) Dynamic SmartVPN
C) Symmetric VPN Autodial
D) Auto Switched VPN Service
Correct Answer
verified
Essay
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Layer 1
B) Layer 2
C) Layer 4
D) Layer 7
Correct Answer
verified
Multiple Choice
A) Citrix XenServer
B) VirtualBox
C) VMware Player
D) Linux KVM
Correct Answer
verified
Multiple Choice
A) VNC is faster than Remote Desktop, and requires less network bandwidth.
B) VNC is open source, allowing companies to develop their own software based on VNC.
C) VNC uses the Remote Desktop Protocol (RDP) .
D) VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
Correct Answer
verified
Multiple Choice
A) VMware vSphere
B) Oracle VirtualBox
C) Parallels
D) Citrix Xen
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) L2TP
B) TLS
C) IPsec
D) SSL
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A VPN concentrator authenticates VPN clients.
B) A VPN concentrator establishes tunnels for VPN connections.
C) A VPN concentrator shuts down established connections with malicious traffic occurs.
D) A VPN concentrator manages encryption for VPN transmissions.
Correct Answer
verified
Showing 1 - 20 of 50
Related Exams