A. True B. False Question 2 of 44 2.0 Points A. True B. False Question 3 of 44 2
ID: 3739579 • Letter: A
Question
A. True
B. False
Question 2 of 44
2.0 Points
A. True
B. False
Question 3 of 44
2.0 Points
A. A hardware VPN device
B. A VPN created between two individual hosts across a local or intermediary network
C. Used to connect a remote or mobile host into a networked office network workstation
D. A set of rules and procedures—usually mathematical in nature—that can define how the encryption and decryption processes operate
Question 4 of 44
2.0 Points
A. True
B. False
Question 5 of 44
2.0 Points
A. Hardware VPN
B. Host-to-site VPN
C. Asymmetric cryptography
D. Leased Line
E. None of the above
Question 6 of 44
2.0 Points
A. Digital certificate
B. Asymmetric cryptography
C. Ciphertext
D. Algorithm
Transport mode encryption protects only the original IP packet’s payload, which retains its original IP header.A. True
B. False
Reset SelectionMark for Review What's This?
Question 2 of 44
2.0 Points
A host-based firewall is an appliance firewall placed on the border or edge of an organization’s network.A. True
B. False
Reset SelectionMark for Review What's This?
Question 3 of 44
2.0 Points
Which of the following characteristics relates to the term algorithm?A. A hardware VPN device
B. A VPN created between two individual hosts across a local or intermediary network
C. Used to connect a remote or mobile host into a networked office network workstation
D. A set of rules and procedures—usually mathematical in nature—that can define how the encryption and decryption processes operate
Reset SelectionMark for Review What's This?
Question 4 of 44
2.0 Points
Symmetric cryptography encodes and decodes information using different keys for each process.A. True
B. False
Reset SelectionMark for Review What's This?
Question 5 of 44
2.0 Points
Which of the following refers to a communication pathway, circuit, or frequency dedicated or reserved for a specific transmission?A. Hardware VPN
B. Host-to-site VPN
C. Asymmetric cryptography
D. Leased Line
E. None of the above
Reset SelectionMark for Review What's This?
Question 6 of 44
2.0 Points
Which of the following refers to encoding and decoding information using two separate but related keys for each process?A. Digital certificate
B. Asymmetric cryptography
C. Ciphertext
D. Algorithm
Explanation / Answer
1. True
Protecting the payload of IP packet is termed as Transport mode encryption 2.
2. False
Its called Corporate Firewall but not Host-based Firewall.
3. D. A set of rules and procedures—usually mathematical in nature—that can define how the encryption and decryption processes operate.
4. False
Symmetric Cryptography uses same key for both encoding and decoding.
5. E. None of the above
It refers to 'Channel' but not any of the above.
6. B. Asymmetric Cryptography
It uses seperate but not related keys to encode and decode any information.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.