Which of these are characteristics of the Data Link Layer? (Select all that apply)
Correct
Incorrect
Question 2 of 23
2. Question
0 point(s)
Which protocol enables file sharing, printer sharing, network browsing, and inter-process communication (through named pipes) over a computer network?
Correct
Incorrect
Question 3 of 23
3. Question
0 point(s)
What is the difference between Layer 2 and Layer 3 switches?
Correct
Incorrect
Question 4 of 23
4. Question
0 point(s)
Which statement is true about MAC addresses? (Select all that apply)
Correct
Incorrect
Question 5 of 23
5. Question
0 point(s)
Layer 2 network switches maintain a table in memory that matches MAC addresses to the switch’s Ethernet ports. This table is called a __________ table.
Correct
Incorrect
Question 6 of 23
6. Question
0 point(s)
Which is the correct subnet mask for IP 172.16.242.133/27
Correct
Incorrect
Question 7 of 23
7. Question
0 point(s)
Which of these statements is false?
Correct
Incorrect
Question 8 of 23
8. Question
0 point(s)
Which is true of tunnel mode?
Correct
Incorrect
Question 9 of 23
9. Question
0 point(s)
The meaning of tunnel in the tunnel model of IPSec is that
Correct
Incorrect
Question 10 of 23
10. Question
0 point(s)
With IPSEc, if the encryption protocol is ESP and encryption algorithm is a variant of AES_GCM, what is the authentication protocol?
Correct
Incorrect
Question 11 of 23
11. Question
0 point(s)
Which of these depicts the combination of AH and ESP in transport and tunnel modes. (Select all that apply)
Correct
Incorrect
Question 12 of 23
12. Question
0 point(s)
Which of these depicts an IPSec data datagram with ESP in tunnel mode?
Correct
Incorrect
Question 13 of 23
13. Question
0 point(s)
Which of these depicts AH in IPSec tunnel mode?
Correct
Incorrect
Question 14 of 23
14. Question
0 point(s)
AH is the ______ of a packet and a _________ key.
Correct
Incorrect
Question 15 of 23
15. Question
0 point(s)
In what scenario, would you not use ESP?
Correct
Incorrect
Question 16 of 23
16. Question
0 point(s)
True or False: IPSec uses both transport mode and tunnel mode to encrypt data
Correct
Incorrect
Question 17 of 23
17. Question
0 point(s)
What are the disadvantages of IPSec? (Select all that apply)
Correct
Incorrect
Question 18 of 23
18. Question
0 point(s)
With IPSec, the Key Management Protocol and Internet Security Association provides a framework for authentication and key exchange. What is this called?
Correct
Incorrect
Question 19 of 23
19. Question
0 point(s)
It also provides data integrity, authentication, and anti-replay and it does not provide encryption. The anti-replay protection protects against the unauthorized transmission of packets. It does not protect data confidentiality.
Correct
Incorrect
Question 20 of 23
20. Question
0 point(s)
Name 3 protocols used in IPSec. (Select 3)
Correct
Incorrect
Question 21 of 23
21. Question
0 point(s)
_________ encrypts only the data packet’s payload while leaving the IP header unchanged. The unencrypted packet header enables routers to determine the destination address of each data packet. As a result, IPSec transport is utilized in a closed and trusted network, such as to secure a direct link between two computers.
Correct
Incorrect
Question 22 of 23
22. Question
0 point(s)
Which of these depicts basic IPSec protection in transport mode?
Correct
Incorrect
Question 23 of 23
23. Question
0 point(s)
The ____________ is appropriate for sending data over public networks because it improves data security against unauthorised parties. The computer encrypts all data, including the payload and header, and adds a new header to it.
Correct
Incorrect
Login
Accessing this course requires a login. Please enter your credentials below!