O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exam Questions

1:Which of the following are tunneling protocols used when setting up a VPN? (Choose two.)
  1. PPTP

  2. SSH

  3. FTP

  4. 3DES

  5. L2TP

  6. MD5

A1: A, E. PPTP and L2TP are both used for creating tunnels across the Internet. SSH and FTP are utilities, and 3DES and MD5 are encryption algorithms.
2:Which of the following are used with L2TP? (Choose two.)
  1. PPP

  2. L2F

  3. SSH

  4. PPTP

  5. IPSec

A2: B, E. Layer 2 forwarding (L2F) establishes the tunnel, and IPSec encrypts the data. PPP is its own protocol; SSH is a shell program; and PPTP is the predecessor to L2TP.
3:What is the difference between AH and ESP when configuring IPSec?
  1. AH verifies the integrity of the data and encrypts the data as well.

  2. AH only encrypts the data; it does not verify data integrity.

  3. ESP ensures data integrity ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required