34. A ____ is the value used by the cryptographic formula or algorithm to either
ID: 3622575 • Letter: 3
Question
34. A ____ is the value used by the cryptographic formula or algorithm to either produce or decrypt ciphertext.a. cipher c. key
b. header d. lock
____ 35. With ____ keys, when the recipient receives the encrypted message, he or she can decrypt it using the private key.
a. symmetric c. asymmetric
b. simple d. IPSec
____ 36. What is the name of the hardware device specifically designed to terminate VPNs?
a. VPN Appliance c. VPN Firewall
b. VPN Endpoint d. VPN Router
____ 37. What is Novell's directory service used by BorderManager called?
a. Bindary c. Active Directory
b. NDS d. eDirectory
____ 38. In which mode does a VPN concentrator act like a hardware device enabling a secure site-to-site VPN connection?
a. Real c. Client
b. Network extension d. Server
____ 39. In a ____ configuration, each participant (that is, network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.
a. Mesh c. Mixed
b. Hub-and-spoke d. Hybrid
____ 40. ____ entails the preparation for and recovery from a disaster, whether natural or human-made.
a. Disaster recovery planning c. Incident response planning
b. Business continuity planning d. Business impact analysis
Explanation / Answer
34. a) Cipher 35. c) Asymmetric 36. a) VPN appliance 38. b) Network extension mode 39. a) Mesh 40 a) Disaster recovery planning
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.