34. A ____ is the value used by the cryptographic formula or algorithm to either
ID: 3622575 • Letter: 3
Question
34. A ____ is the value used by the cryptographic formula or algorithm to either produce or decrypt ciphertext.a. cipher c. key
b. header d. lock
____ 35. With ____ keys, when the recipient receives the encrypted message, he or she can decrypt it using the private key.
a. symmetric c. asymmetric
b. simple d. IPSec
____ 36. What is the name of the hardware device specifically designed to terminate VPNs?
a. VPN Appliance c. VPN Firewall
b. VPN Endpoint d. VPN Router
____ 37. What is Novell's directory service used by BorderManager called?
a. Bindary c. Active Directory
b. NDS d. eDirectory
____ 38. In which mode does a VPN concentrator act like a hardware device enabling a secure site-to-site VPN connection?
a. Real c. Client
b. Network extension d. Server
____ 39. In a ____ configuration, each participant (that is, network, router, or computer) in the VPN has an approved relationship, called a security association (SA), with every other participant.
a. Mesh c. Mixed
b. Hub-and-spoke d. Hybrid
____ 40. ____ entails the preparation for and recovery from a disaster, whether natural or human-made.
a. Disaster recovery planning c. Incident response planning
b. Business continuity planning d. Business impact analysis
Explanation / Answer
34. a) Cipher 35. c) Asymmetric 36. a) VPN appliance 38. b) Network extension mode 39. a) Mesh 40 a) Disaster recovery planning