TELECOMMUNICATIONS AND NETWORK SECURITY

I NEED 13 ANSWERS CHOOSE THE BEST ANSWER. 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 1/7

Content … Lesson 8: Configuring a VPN Client for Secure File Transfers
Review Test Submission: Lab 8 Quiz
H

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Review Test Submission: Lab 8 QuizReview Test Submission: Lab 8 Quiz

User Mr. Prapul Kumar Kalapala
Course 2018_SPR_IG_Telecommunications Network

Security_22_23_COMBINED
Test Lab 8 Quiz
Started 2/7/18 6:08 PM
Submitted 2/7/18 6:35 PM
Due Date 2/11/18 11:59 PM
Status Completed
Attempt
Score

10.50000 out of 30.00000 points

Time
Elapsed

26 minutes

Results
Displayed

All Answers, Submitted Answers

Question 1

Selected
Answer:

Answers:

Before analyzing a network packet file in Wireshark in this lab,
you created a filter. What did the filter do?

Displayed all hex data for a packet file

Deleted certain types of traffic from the
packet file

Displayed certain types of traffic in a packet
file

Displayed all hex data for a packet file

Added certain types of traffic to the packet
file

Question 2

Selected
Answer:
Answers:

How can FTP be made more secure?

Use a graphical user interface (GUI) rather than a
command-line interface.

Encrypt files before transferring them.

Decrypt files before transferring them.

Home Courses

0.00000 out of 1.50000 points

0.00000 out of 1.50000 points

Prapul Kumar Kalapala 2

https://ucumberlands.blackboard.com/

https://ucumberlands.blackboard.com/webapps/blackboard/execute/courseMain?course_id=_97115_1

https://ucumberlands.blackboard.com/webapps/blackboard/content/listContent.jsp?course_id=_97115_1&content_id=_1134210_1&mode=reset

https://ucumberlands.blackboard.com/webapps/blackboard/content/listContent.jsp?course_id=_97115_1&content_id=_1135542_1&mode=reset

https://ucumberlands.blackboard.com/webapps/portal/execute/tabs/tabAction?tab_tab_group_id=_46_1

https://ucumberlands.blackboard.com/webapps/portal/execute/tabs/tabAction?tab_tab_group_id=_2_1

https://ucumberlands.blackboard.com/webapps/login/?action=logout

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 2/7

Use a graphical user interface (GUI) rather than a
command-line interface.

Use a command-line interface rather than a
graphical user interface (GUI).

Question 3

Selected
Answer:
Answers:

If Secure Shell (SSH) is configured to use asymmetrical
encryption, which of the following statements is true?

One key and a secure protocol are required to
send data.

One key is required when sending data.

Two keys are required when sending data.

One key and a secure protocol are required to
send data.

Two keys and Telnet are required to send data.

Question 4

Selected
Answer:
Answers:

In Windows, what is Trusted Root Certification Authorities?

A key exchange framework

A key exchange framework

The name of a default VPN connection

A certificate store

A folder for protocols used in secure VPN
connections

Question 5

Selected
Answer:
Answers:

In Wireshark, which of the following is true of the Hex Data
pane?

It displays the same information as the Frame
Details pane but in an easier-to-read format.

It displays packet information but not file names or
file paths.

It displays the same information as the Frame
Details pane but in an easier-to-read format.

It can display file contents in hexadecimal only.

It can display file contents in hexadecimal and clear
text.

Question 6

0.00000 out of 1.50000 points
0.00000 out of 1.50000 points
0.00000 out of 1.50000 points
0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 3/7

Selected
Answer:
Answers:

In this lab, you removed a split tunnel configuration from an
IPsec VPN adapter. What was the result?

All traffic was forced through the IPsec tunnel,
making the connection faster but less secure.

No traffic was allowed to pass through the

IPsec

tunnel, making the connection faster but less
secure.

No traffic was allowed to pass through the IPsec
tunnel, making the connection faster and more
secure.

All traffic was forced through the IPsec tunnel,
making the connection faster but less secure.

All traffic was forced through the IPsec tunnel,
making the connection slower but more secure.

Question 7

Selected Answer:

Answers:

Of the following, what is a packet retransmission most likely to
indicate?

An incorrect user password

An intentional packet injection

A new server certificate

An incorrect user password

An anonymous connection

Question 8

Selected Answer:
Answers:

Secure Shell (SSH) protocol replaces which older, insecure
protocol?

Telnet

L2TP

Telnet

FTP

IPsec

Question 9

Selected
Answer:
Answers:

What is ISAKMP?

A protocol used to establish tunnels and
cryptographic keys

A secure Certificate Authority (CA)

A file transfer application

0.00000 out of 1.50000 points

1.50000 out of 1.50000 points

1.50000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 4/7

A protocol used to establish tunnels and
cryptographic keys

A protocol used for authorization of VPN users

Question 10

Selected
Answer:
Answers:

What is split tunneling?

Using two security protocols for a single VPN

Using two security protocols for a single VPN

Configuring clients to access a public network
through a VPN while maintaining access to local
resources at the same time, using the same or
different network connections

Using two different VPN connections to access the
same resources

Configuring clients to access public networks and
local resources through two different VPNs

Question 11

Selected Answer:
Answers:

What is the 255.255.255.255 address typically associated with?

Subnet mask

VPN client IP address

VPN server IP address

A mobile device network adapter

Subnet mask

Question 12

Selected
Answer:
Answers:

When configuring a VPN connection from a client to a server,
what does the route add mask 255.255.255.0
command do?

Masks the IP address of the IPsec firewall.

Add a route to the client’s internal firewall.

Add a route to the connecting IP address of the
IPsec firewall.

Masks the IP address of the IPsec firewall.

Masks the source’s network address.

Question 13

0.00000 out of 1.50000 points
1.50000 out of 1.50000 points
0.00000 out of 1.50000 points
0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 5/7

Selected
Answer:
Answers:

When creating a VPN client in Windows, which of the following
is not an option when selecting the type of VPN?

Layer 2 Tunneling Protocol with IPsec
(L2TP/IPsec)

Point to Point Tunneling Protocol (PPTP)

Layer 2 Tunneling Protocol with IPsec
(L2TP/IPsec)

IKEv2

Extensible Authentication Protocol (EAP)

Question 14

Selected Answer:
Answers:

Which Windows feature do you use to create a VPN client?

Network and Sharing Center

Internet Options

Windows Firewall

Certificate Manager

Network and Sharing Center

Question 15

Selected
Answer:
Answers:

Which of the following statements is NOT true of Secure Shell
(SSH)?

An attacker who gains access to SSH encryption
keys cannot decrypt and read content.

SSH encrypts files during the file transfer process.

You can use SSH with FTP.

An attacker who gains access to SSH encryption
keys can decrypt and read content.

An attacker who gains access to SSH encryption
keys cannot decrypt and read content.

Question 16

Selected
Answer:
Answers:

Which of the following statements is NOT true regarding VPNs?

VPN tunnels are not 100% secure.

VPN tunnels are not 100% secure.

A client using a VPN tunnel is vulnerable to
inline attacks.

A VPN does not mask a client’s IP address.

The code of an inline attack can reveal a client
system’s IP address.

1.50000 out of 1.50000 points
1.50000 out of 1.50000 points
0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 6/7

Question 17

Selected
Answer:
Answers:

Which of the following statements is true of split tunnel
configurations?

Clients cannot route IPsec traffic through the
VPN tunnel.

Clients do not keep local traffic on their own
network.

Clients cannot route IPsec traffic through the
VPN tunnel.

The configuration is optimal for performance.

The configuration is more secure than specifying
a network address.

Question 18

Selected
Answer:
Answers:

Which type of files are most appropriate to exchange via
anonymous FTP?

A company’s marketing literature

Code files for a software manufacturer’s
application

A company’s sales data

A company’s marketing literature

Customer database files

Question 19

Selected
Answer:
Answers:

You are configuring a VPN client on a Windows 2016 server
using IPsec to create a secure tunnel to a L2TP\IPsec server.
Which of the following statements is true?

L2TP does not perform encryption.

L2TP does not perform encryption.

L2TP performs encryption.

L2TP works only for IP networks, not non-IP
networks.

L2TP works only for non-IP networks, not non-
IP networks.

Question 20

You just set up a VPN client on a Windows computer to work

0.00000 out of 1.50000 points
1.50000 out of 1.50000 points
1.50000 out of 1.50000 points
0.00000 out of 1.50000 points

2/7/2018 Review Test Submission: Lab 8 Quiz – 2018_…

https://ucumberlands.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_3250339_1&course_id=_97115_1&content_id=_1199432_… 7/7

Wednesday, February 7, 2018 6:35:09 PM EST

Selected
Answer:
Answers:

with a pfSense VPN server. You now want to make an IPsec
connection to the server using IKEv2. What is the first step you
must take?

Authenticate with the pfSense server.

Import a certificate file from the pfSense system.

Authenticate with the pfSense server.

Revoke a certificate from the pfSense server
Certificate Authority (CA).

Add a route to the connecting IP address of the
IPsec firewall.

←← OKOK

javascript:launch(‘/webapps/blackboard/content/listContent.jsp?content_id=_1135542_1&course_id=_97115_1&nolaunch_after_review=true’);

Still stressed with your coursework?
Get quality coursework help from an expert!