mvctc_ccna4_chapter7 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
who invented gre | cisco |
what is confidentiality | encrypt before transmit |
what is data integrity | verify data has not been changed |
WHAT IS authentication | make sure data has come from who it said it came from |
which algorithm is assymetrical key crypto system | rsa |
why do we use hash | make sure the data was not altered |
cisco anyconnect provides what type of vpn | client based ssl |
list 3 benifits of a vpn over a leased line | scalibility security cost |
where is a remote access vpn encrypted | host |
where is a site to site vpn encrypted | router |
are vpns scalible | yes |
what crypto key offers encryption in multiples of 512 | rsa |
true or false gre only caries ipv4 packets | false |
can a vpn protect packets from hacking | yes |
true or false gre was made by hp | false |
what is the command to access a tunnel on a router | interface tunnel |
what does vpn stand for | virtual private network |
what are the two types of vpns | remote access and site-to-site |
what is the best symmetrical key encryption | aes |
true or false a gre tunnel encrypts the packets that go through it | false |
Created by:
tt409
Popular Computers sets