Question 7 of 44 2.0 Points A. Flexibility B. Anonymity C. Security D. Denial of
ID: 3739577 • Letter: Q
Question
Question 7 of 44
2.0 Points
A. Flexibility
B. Anonymity
C. Security
D. Denial of service
Question 8 of 44
2.0 Points
A. True
B. False
Question 9 of 44
2.0 Points
A. The capability for a network or system user to become known to law enforcement
B. A process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint
C. The act of keeping information about a network or system user from being disclosed to unauthorized people
D. An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products
E. None of the above
Question 10 of 44
2.0 Points
A. A contractual commitment by a service provider that their data will remain encrypted and private against all attacks
B. The ability for a network or system user to remain unknown
C. An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products
D. A process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint
E. None of the above
Question 11 of 44
2.0 Points
A. Internally connected architecture
B. Bypass architecture
C. DMZ architecture
D. Two-factor architecture
Question 12 of 44
2.0 Points
A. True
B. False
Question 7 of 44
2.0 Points
Which of the following reflects the ability of a network or system user to remain unknown?A. Flexibility
B. Anonymity
C. Security
D. Denial of service
Reset SelectionMark for Review What's This?
Question 8 of 44
2.0 Points
A VPN policy should address which authorization methods are permitted on the system.A. True
B. False
Reset SelectionMark for Review What's This?
Question 9 of 44
2.0 Points
Which of the following describes anonymity for VPNs?A. The capability for a network or system user to become known to law enforcement
B. A process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint
C. The act of keeping information about a network or system user from being disclosed to unauthorized people
D. An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products
E. None of the above
Reset SelectionMark for Review What's This?
Question 10 of 44
2.0 Points
Which of the following describes a service level agreement (SLA)?A. A contractual commitment by a service provider that their data will remain encrypted and private against all attacks
B. The ability for a network or system user to remain unknown
C. An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products
D. A process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn and enter a secure network with little or no trouble because it is entering from a secure and verified endpoint
E. None of the above
Reset SelectionMark for Review What's This?
Question 11 of 44
2.0 Points
Which type of architecture deploys the VPN in a network segment so that traffic to and from the VPN is not firewalled?A. Internally connected architecture
B. Bypass architecture
C. DMZ architecture
D. Two-factor architecture
Reset SelectionMark for Review What's This?
Question 12 of 44
2.0 Points
The least common method for implementing a highly available VPN involves buying two VPN hardware units and configuring them as a highly available pair.A. True
B. False
Explanation / Answer
Question 7 of 44
Which of the following reflects the ability of a network or system user to remain unknown?
Answer: Option B. Anonymity
Question 8 of 44
A VPN policy should address which authorization methods are permitted on the system.
Answer: True
Question 9 of 44
Which of the following describes anonymity for VPNs?
Answer: Option D. An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products
Question 10 of 44
Which of the following describes a service level agreement (SLA)?
Answer: Option A. A contractual commitment by a service provider that their data will remain encrypted and private against all attacks
Question 11 of 44
Which type of architecture deploys the VPN in a network segment so that traffic to and from the VPN is not firewalled?
Answer: Option C. DMZ architecture
Explanation: An administrator can install a firewall on a network to create a demilitarized zone (DMZ). A DMZ separates a public network from a private network. A DMZ can be implemented with one firewall that is connected to the DMZ segment, the private network, and the Internet. A DMZ can also be implemented with two firewalls. In this configuration, one firewall is connected to a private network and a DMZ segment, and the other firewall is connected to the Internet and the DMZ segment.
Question 12 of 44
The least common method for implementing a highly available VPN involves buying two VPN hardware units and configuring them as a highly available pair.
Answer Option B. False
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.