Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 19 of 44 2.0 Points A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Laye

ID: 3739570 • Letter: Q

Question

Question 19 of 44

2.0 Points

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5

Question 20 of 44

2.0 Points

A. True

B. False

Question 21 of 44

2.0 Points

A. True

B. False

Question 22 of 44

2.0 Points

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5

Question 23 of 44

2.0 Points

A. Unknown security of the device, e.g., viruses, installed software

B. Data infiltration risk is many times higher than with corporate-owned devices

C. Devices must be used in split-tunnel mode

D. BYOD devices are never allowed on corporate networks

E. BYOD device users must implement their own VPNs

Question 24 of 44

2.0 Points

A. Site-to-site VPN

B. Host-to-site VPN

C. Host-to-host VPN

D. Extranet VPN

E. None of the above

Question 19 of 44

2.0 Points

L2TP VPNs operate at which layer of the TCP/IP-OSI hybrid stack?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5

Reset Selection

Mark for Review What's This?

Question 20 of 44

2.0 Points

SSL-based VPNs can enable remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption.

A. True

B. False

Reset Selection

Mark for Review What's This?

Question 21 of 44

2.0 Points

A site-to-site VPN provides connectivity between two locations such as a main office and a branch office.

A. True

B. False

Reset Selection

Mark for Review What's This?

Question 22 of 44

2.0 Points

IPSec VPNs operate at which layer of the TCP/IP-OSI hybrid stack?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5

Reset Selection

Mark for Review What's This?

Question 23 of 44

2.0 Points

What threats do BYOD devices pose to VPN security?

A. Unknown security of the device, e.g., viruses, installed software

B. Data infiltration risk is many times higher than with corporate-owned devices

C. Devices must be used in split-tunnel mode

D. BYOD devices are never allowed on corporate networks

E. BYOD device users must implement their own VPNs

Reset Selection

Mark for Review What's This?

Question 24 of 44

2.0 Points

Which type of VPN is the most-used in terms of volume of traffic transmitted per day?

A. Site-to-site VPN

B. Host-to-site VPN

C. Host-to-host VPN

D. Extranet VPN

E. None of the above

Explanation / Answer

Answers:

19A: Option C Layer 3 (L2TP is used in Network Layer for security Purpose)

20A: True

21A: True (it will establish the connection using the internet)

22A: Option C Layer 3 (used in Network Layer for security Purpose)

23A: B. Data infiltration risk is many times higher than with corporate-owned devices

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote