Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Which of the following statements is true of firewalls

16/11/2021 Client: muhammad11 Deadline: 2 Day

TELECOMMUNICATIONS AND NETWORK SECURITY

Content ... Lesson 8: Configuring a VPN Client for Secure File Transfers Review Test Submission: Lab 8 Quiz H

Review Test Submission: Lab 8 QuizReview Test Submission: Lab 8 Quiz

User Mr. Prapul Kumar Kalapala Course 2018_SPR_IG_Telecommunications Network

Security_22_23_COMBINED Test Lab 8 Quiz Started 2/7/18 6:08 PM Submitted 2/7/18 6:35 PM Due Date 2/11/18 11:59 PM Status Completed Attempt Score

10.50000 out of 30.00000 points

Time Elapsed

26 minutes

Results Displayed

All Answers, Submitted Answers

Question 1

Selected Answer:

Answers:

Before analyzing a network packet file in Wireshark in this lab, you created a filter. What did the filter do?

Displayed all hex data for a packet file

Deleted certain types of traffic from the packet file

Displayed certain types of traffic in a packet file

Displayed all hex data for a packet file

Added certain types of traffic to the packet file

Question 2

Selected Answer:

Answers:

How can FTP be made more secure?

Use a graphical user interface (GUI) rather than a command-line interface.

Encrypt files before transferring them.

Decrypt files before transferring them.

Home Courses

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

Prapul Kumar Kalapala 2

https://ucumberlands.blackboard.com/
https://ucumberlands.blackboard.com/webapps/blackboard/execute/courseMain?course_id=_97115_1
https://ucumberlands.blackboard.com/webapps/blackboard/content/listContent.jsp?course_id=_97115_1&content_id=_1134210_1&mode=reset
https://ucumberlands.blackboard.com/webapps/blackboard/content/listContent.jsp?course_id=_97115_1&content_id=_1135542_1&mode=reset
https://ucumberlands.blackboard.com/webapps/portal/execute/tabs/tabAction?tab_tab_group_id=_46_1
https://ucumberlands.blackboard.com/webapps/portal/execute/tabs/tabAction?tab_tab_group_id=_2_1
https://ucumberlands.blackboard.com/webapps/login/?action=logout
2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 2/7

Use a graphical user interface (GUI) rather than a command-line interface.

Use a command-line interface rather than a graphical user interface (GUI).

Question 3

Selected Answer:

Answers:

If Secure Shell (SSH) is configured to use asymmetrical encryption, which of the following statements is true?

One key and a secure protocol are required to send data.

One key is required when sending data.

Two keys are required when sending data.

One key and a secure protocol are required to send data.

Two keys and Telnet are required to send data.

Question 4

Selected Answer:

Answers:

In Windows, what is Trusted Root Certification Authorities?

A key exchange framework

A key exchange framework

The name of a default VPN connection

A certificate store

A folder for protocols used in secure VPN connections

Question 5

Selected Answer:

Answers:

In Wireshark, which of the following is true of the Hex Data pane?

It displays the same information as the Frame Details pane but in an easier-to-read format.

It displays packet information but not file names or file paths.

It displays the same information as the Frame Details pane but in an easier-to-read format.

It can display file contents in hexadecimal only.

It can display file contents in hexadecimal and clear text.

Question 6

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 3/7

Selected Answer:

Answers:

In this lab, you removed a split tunnel configuration from an IPsec VPN adapter. What was the result?

All traffic was forced through the IPsec tunnel, making the connection faster but less secure.

No traffic was allowed to pass through the IPsec tunnel, making the connection faster but less secure.

No traffic was allowed to pass through the IPsec tunnel, making the connection faster and more secure.

All traffic was forced through the IPsec tunnel, making the connection faster but less secure.

All traffic was forced through the IPsec tunnel, making the connection slower but more secure.

Question 7

Selected Answer:

Answers:

Of the following, what is a packet retransmission most likely to indicate?

An incorrect user password

An intentional packet injection

A new server certificate

An incorrect user password

An anonymous connection

Question 8

Selected Answer:

Answers:

Secure Shell (SSH) protocol replaces which older, insecure protocol?

Telnet

L2TP

Telnet

FTP

IPsec

Question 9

Selected Answer:

Answers:

What is ISAKMP?

A protocol used to establish tunnels and cryptographic keys

A secure Certificate Authority (CA)

A file transfer application

0.00000 out of 1.50000 points

1.50000 out of 1.50000 points

1.50000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 4/7

A protocol used to establish tunnels and cryptographic keys

A protocol used for authorization of VPN users

Question 10

Selected Answer:

Answers:

What is split tunneling?

Using two security protocols for a single VPN

Using two security protocols for a single VPN

Configuring clients to access a public network through a VPN while maintaining access to local resources at the same time, using the same or different network connections

Using two different VPN connections to access the same resources

Configuring clients to access public networks and local resources through two different VPNs

Question 11

Selected Answer:

Answers:

What is the 255.255.255.255 address typically associated with?

Subnet mask

VPN client IP address

VPN server IP address

A mobile device network adapter

Subnet mask

Question 12

Selected Answer:

Answers:

When configuring a VPN connection from a client to a server, what does the route add mask 255.255.255.0 command do?

Masks the IP address of the IPsec firewall.

Add a route to the client's internal firewall.

Add a route to the connecting IP address of the IPsec firewall.

Masks the IP address of the IPsec firewall.

Masks the source's network address.

Question 13

0.00000 out of 1.50000 points

1.50000 out of 1.50000 points

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 5/7

Selected Answer:

Answers:

When creating a VPN client in Windows, which of the following is not an option when selecting the type of VPN?

Layer 2 Tunneling Protocol with IPsec (L2TP/IPsec)

Point to Point Tunneling Protocol (PPTP)

Layer 2 Tunneling Protocol with IPsec (L2TP/IPsec)

IKEv2

Extensible Authentication Protocol (EAP)

Question 14

Selected Answer:

Answers:

Which Windows feature do you use to create a VPN client?

Network and Sharing Center

Internet Options

Windows Firewall

Certificate Manager

Network and Sharing Center

Question 15

Selected Answer:

Answers:

Which of the following statements is NOT true of Secure Shell (SSH)?

An attacker who gains access to SSH encryption keys cannot decrypt and read content.

SSH encrypts files during the file transfer process.

You can use SSH with FTP.

An attacker who gains access to SSH encryption keys can decrypt and read content.

An attacker who gains access to SSH encryption keys cannot decrypt and read content.

Question 16

Selected Answer:

Answers:

Which of the following statements is NOT true regarding VPNs?

VPN tunnels are not 100% secure.

VPN tunnels are not 100% secure.

A client using a VPN tunnel is vulnerable to inline attacks.

A VPN does not mask a client's IP address.

The code of an inline attack can reveal a client system's IP address.

1.50000 out of 1.50000 points

1.50000 out of 1.50000 points

0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 6/7

Question 17

Selected Answer:

Answers:

Which of the following statements is true of split tunnel configurations?

Clients cannot route IPsec traffic through the VPN tunnel.

Clients do not keep local traffic on their own network.

Clients cannot route IPsec traffic through the VPN tunnel.

The configuration is optimal for performance.

The configuration is more secure than specifying a network address.

Question 18

Selected Answer:

Answers:

Which type of files are most appropriate to exchange via anonymous FTP?

A company's marketing literature

Code files for a software manufacturer's application

A company's sales data

A company's marketing literature

Customer database files

Question 19

Selected Answer:

Answers:

You are configuring a VPN client on a Windows 2016 server using IPsec to create a secure tunnel to a L2TP\IPsec server. Which of the following statements is true?

L2TP does not perform encryption.

L2TP does not perform encryption.

L2TP performs encryption.

L2TP works only for IP networks, not non-IP networks.

L2TP works only for non-IP networks, not non- IP networks.

Question 20

You just set up a VPN client on a Windows computer to work

0.00000 out of 1.50000 points

1.50000 out of 1.50000 points

1.50000 out of 1.50000 points

0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_...

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 7/7

Wednesday, February 7, 2018 6:35:09 PM EST

Selected Answer:

Answers:

with a pfSense VPN server. You now want to make an IPsec connection to the server using IKEv2. What is the first step you must take?

Authenticate with the pfSense server.

Import a certificate file from the pfSense system.

Authenticate with the pfSense server.

Revoke a certificate from the pfSense server Certificate Authority (CA).

Add a route to the connecting IP address of the IPsec firewall.

←← OKOK

javascript:launch('/webapps/blackboard/content/listContent.jsp?content_id=_1135542_1&course_id=_97115_1&nolaunch_after_review=true');

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Chartered Accountant
Isabella K.
Study Master
Smart Tutor
Assignment Helper
Quick Finance Master
Writer Writer Name Offer Chat
Chartered Accountant

ONLINE

Chartered Accountant

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$45 Chat With Writer
Isabella K.

ONLINE

Isabella K.

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$47 Chat With Writer
Study Master

ONLINE

Study Master

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$31 Chat With Writer
Smart Tutor

ONLINE

Smart Tutor

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$16 Chat With Writer
Assignment Helper

ONLINE

Assignment Helper

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$33 Chat With Writer
Quick Finance Master

ONLINE

Quick Finance Master

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$33 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Londonstockexchange com prices and markets stocks stocks and prices htm - Professional ethics and responsibilities of intermediaries - Bancabc mortgage loans zimbabwe - Hermine hug hellmuth play therapy - Contemporary culture definition - Wilsonart landmark wood 7981k 12 - Ati video case study type 1 diabetes - Once a venue has received a cvent rfp - Panera bread company case study answers - Research paper - Bud light brand positioning - The 'beijing consensus' was deemed an alternative to _________ by joshua cooper ramo. - C++ program to convert decimal to binary using functions - Camp lejeune education center phone number - Current direction in a circuit - Native Spiritual Herbalist Traditional healer +27789489516 /Lost Love Spells Caster in Texas Dallas - Diamondlite pty ltd sydney au - Rewrite each of the following as a base ten numeral - Csi senses board game instructions - Health Services for Special Population-Focus on Behavioral Health - Alpine tundra food web - Biopsychosocial assessment tool - Expansion joints in brickwork - A particularly common question in the study of wildlife - Tarantella a doll's house - Percentage of copper in brass experiment - Sounds incorporated william tell overture - CJT101 DISCUSSION - Why did elizabeth proctor fired abigail - Fox in the gruffalo - Wk6 DQ - Data Analysis & Business Intelligence - The basic aim of psychoanalytic therapy is to - The physiological effects of pornography on the brain - Mr and mrs right christmas story - Example of applied research title - How do you think by using language - Global Crime & Justice - Stability strategies in business pros and cons - Weighted average flotation cost - Https www youtube com watch v ebgb40yh4sy - Matthew 20 1-16 summary - Faith Integration - Major assignment 3 math 144 - Club car eric charger usb - Circular motion worksheet answers - Week 3 - Week 2 Discussion - Chemistry - Archer daniels midland and the friendly competitors case study - Interactionist perspective on sports - Assignment #015 - Www federalreserve gov releases h6 current - Selling expense flexible budget report - Plagiarism - Direct and inverse proportion word problems - The association areas are located in the - Assig 7 415 - Discussion needed by friday @ 6pm - Dorking lawn tennis club - What is market domain - Design thinking process ppt - Kindred the family soul surrender to love zip - The basic problem portrayed by the traditional phillips curve is - Virtuoso solo passage 7 letters - How many apples are needed to make an apple pie - Nursing - How many square inches in a 8 inch diameter circle - Jordans furniture red sox promotion - Dolan company's accounting records reflect - In expanded academic asap the publication field indicates - Industrial and organizational behavior 6th edition - Six sigma restaurant case study - Science Activity #2 - What are the 5 subaru tenets - Legal aspects of Nursing practice - The State Judicial Selection Process - Dairy farm company singapore - Assignment - Mastering ohio's american government assessment answers chapter 7 - Rs recycling gmbh bad oeynhausen - Concept analysis paper topics - Prentice hall online textbook - HA599 Assignment Unit 3 - Asme b31 1 pdf 2018 free download - Advantages and disadvantages of probation and parole - Class 2 Assessment 2,3, and 4 - The concept of “liberty of living” made economic security an essential part of american freedom. - Quehaceres cotidianos - Toshiba scandal case study - Forensic tools that can examine mac ipod and iphone - I have read and acknowledge example - Assignment 3: Developing an Investigation Plan - Sydney train network map - Jen bought some sesame bagels - Amanda bean's amazing dream printable - Identify 4 principles of implied consent - Refugee mother and child analysis - John d rockefeller vertical integration - Greenwich village society for historic preservation - Educating rita study notes