SSH presides lisle security for establishing a connection and to security for transiting dus A. True B. False Which of the following provides faster and more secure encryptions than TKIP for Vickers transmissions? A. AES B. WEP C. NOS D. PAP Which encryption processional does GRE use to increase the security of is transmission? A. SSL B. SFTP C. IP_sec D. SSH Which protocol is accepted and used by multiple vendors? A. SSL VPN B. L2TP C. SSL D. SSH A hacker mass a program that tries anserous character combination until it stables as the correct combination and cracks the key. What offensive strategy is this program using? A. Bruise force attack B. Zero-day exploit C. CIA tried D. Endpoint security calculability What is the minimum acceptable key are for today\'s security standards? A. 8 bytes B. 128 bits C. 258 bits D. 512 bits In public key encryption, which key is used to decrypt the message? A. Session key B. Private key C. Public key D. Network key Organizations with common interests, such a regulatory requirements, performance requirements, or data access, might share resources in a. A. Public cloud B. Private cloud C. Community cloud D. Hybrid cloud What are the two primary encryption techniques used by VPN_s today?
14)In public key encryption which key is used to decrypt the message.
Answer:) option B is the answer that is private key
16)what are two primary encryption techniques used by VPNS today?
Answer:)VPNS are two primary types L2TP/IPSec nd SSL.SSl VPN connections are less commonly used but both employe a combination of symmetric and asymmetric encryption.
Some of the commonly used protocols are:
1)Point-to-Point Tunnelling protocol(pptp)
2)Layer 2 Tunnelling Protocol (L2TP)
3)Internet Protocol Security (IPSec)
15) organisation with common interest,such as regulatory requirements and performance requirements might share resource in a ?
Answer) option c :community cloud
13) What is the minimum size key for todays security standards?
Answer:) option B.128 bit