Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Security fundamentals( Computer Science major) multiple choice question.

ID: 3591831 • Letter: N

Question


Network Security fundamentals( Computer Science major)
multiple choice question. posting more soon.

CST 3610 Network Security Fundamentals Midterm Esam Otober , 3014 Computer Systems Technology bepartment 18. Select the A answer that describes pep acronym and ias main functionality? Point to- Poin t protocol is commonly used to establish a direct connection between tw nodes & Peer-to-P Peer protocol is used to connect client to virtual host C Point-to-Peer protocol, this protocol is used to connect two FTD bost together to transport files securely O Point-to-Private s securely protocol connector, this is used to support connection between two UNIX servers support telnet connections E None of the above 19. What are the two forms authentications that are used in PPTP SSL Secure Socket Authentication and SSH Secure Socket Handshake Peer-to-Peer E Password Socket Authentication and sSH Secure Socket Handshake Challenge-Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP) D. E. Secure Peer-to-Peer Encryption (SPTP) and SSt Secure Socket Authentiation Connectie 2. Which choice provides a descriptive name of SSH and its function? encryption on teinet SSH adds authentication A SSH stands for Secure Shell Secure Socket Handshake. SSH adds encryption to web server communicaior to transter of Mes C. SSH stands for secure safe Handshake. SSH adds encryption D. SSH stands for Secure Socket Hash. SSH used to encrypt to routers E. SSH stands for Secure Shell Hash. SSH adds encrvption to all proxy server communication 21. Which port does the SSH service utilize? SSH service port is 443. A· B. SSH service port # is so C SSH service port a is 22 D. SSH service port # is 23. E· SSH service port # is 32. model? A. Network Access is protocol layer responsible receiving and supporting higher layer 8. 22. Which best describes the functionality provided by the Network Access Layer in the TCP/IP connection such as telnet, FTP, email etc. such transmitting and receiving of frame over a particular transmission medium, suct C. Network Access is protocol layer is responsible for supporting the encryption of spe Network Access is protocol layer is not involved in any outbound data related conn Network Access layer provides services related physical network layer and support se Ethernet cable. traffic between the routers and hosts D. and use to only support internal loopback adapter traffic

Explanation / Answer

1. A) Point-to-Point protocol is commonly used to establish a direct connection between two nodes.

2. D) Challenge-Handshake Authentication Protocol(CHAP) and Password Authentication Protocol(PAP).

3. A) SSH Stands for Secure Shell,SSH adds authentication and encryption on telnet.

4. C) SSH Service port # is 22.

5. A) The Network access is a protocol layer is responsible for receiving and supporting higher layer connection such as telnet,FTP,email..etc.,