Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

34. A ____ is the value used by the cryptographic formula or algorithm to either

ID: 3622575 • Letter: 3

Question

34. A ____ is the value used by the cryptographic formula or algorithm to either produce or decrypt ciphertext.
a. cipher c. key
b. header d. lock


____ 35. With ____ keys, when the recipient receives the encrypted message, he or she can decrypt it using the private key.
a. symmetric c. asymmetric
b. simple d. IPSec


____ 36. What is the name of the hardware device specifically designed to terminate VPNs?
a. VPN Appliance c. VPN Firewall
b. VPN Endpoint d. VPN Router


____ 37. What is Novell's directory service used by BorderManager called?
a. Bindary c. Active Directory
b. NDS d. eDirectory


____ 38. In which mode does a VPN concentrator act like a hardware device enabling a secure site-to-site VPN connection?
a. Real c. Client
b. Network extension d. Server


____ 39. In a ____ configuration, each participant (that is, network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.
a. Mesh c. Mixed
b. Hub-and-spoke d. Hybrid


____ 40. ____ entails the preparation for and recovery from a disaster, whether natural or human-made.
a. Disaster recovery planning c. Incident response planning
b. Business continuity planning d. Business impact analysis

Explanation / Answer

34. a) Cipher 35. c) Asymmetric 36. a) VPN appliance 38. b) Network extension mode 39. a) Mesh 40 a) Disaster recovery planning

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote