A virtual private network (VPN) implementation best practice is to protect the VPN server behind a firewall.
Blog
What role does the trusted third party serve in public-key c…
What role does the trusted third party serve in public-key certificates? Select all that apply.
Highway systems of driveways, local roads, and national road…
Highway systems of driveways, local roads, and national roads are networks for automobiles, much like the internet is a network for data traffic. Both types of network share some similarities. Select the most appropriate similarities from those listed below.
Leandro is writing a firewall policy. He needs to define whi…
Leandro is writing a firewall policy. He needs to define which type of firewall he needs for each portion of the infrastructure based on differing areas of risk and trust. What are these areas called?
True or False? A keyed hash gives us a way to verify that so…
True or False? A keyed hash gives us a way to verify that some of our own data has not been modified by an attacker or someone who doesn’t have the secret key.
Which of the following is a firewall, proxy, and routing ser…
Which of the following is a firewall, proxy, and routing service that does NOT support caching, encryption endpoint, or load balancing? Note that this service can be found on almost any service or device that supports network address translation.
All of the following are firewall management best practices,…
All of the following are firewall management best practices, EXCEPT:
How many hours a week (on average) did you work?
How many hours a week (on average) did you work?
Onion routing limits a network’s vulnerability to eavesdropp…
Onion routing limits a network’s vulnerability to eavesdropping and traffic analysis.
A company uses an Internet Protocol Security (IPSec) virtual…
A company uses an Internet Protocol Security (IPSec) virtual private network (VPN) solution. It allows remote users to connect to the main office and allows communication between the main office and branch offices securely over the Internet. The main office network uses network address translation (NAT) with an internal IP address range of 192.168.0.1 to 192.168.0.254. Which of the following ranges must remote offices and users NOT use on their internal networks?