100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D334 AIO POWERPOINT CHAPTER 7-12 STUDY GUIDE QUESTIONS WITH VERIFIED ANSWERS

Rating
-
Sold
-
Pages
5
Uploaded on
28-01-2025
Written in
2024/2025

WGU D334 AIO POWERPOINT CHAPTER 7-12 STUDY GUIDE QUESTIONS WITH VERIFIED ANSWERS....

Institution
WGU D334 AIO POWERPOINT
Course
WGU D334 AIO POWERPOINT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D334 AIO POWERPOINT
Course
WGU D334 AIO POWERPOINT

Document information

Uploaded on
January 28, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

WGU D334 AIO POWERPOINT CHAPTER 7-12
STUDY GUIDE QUESTIONS WITH VERIFIED
ANSWERS


SSL/TLS
with ______ the tunnel is created with a symmetric key method and then a
signature is created with a hashing method
VPN
with a _____ tunnel we aim to create a connection from a host machine to a
trusted network and which is tunneled through a public network
IPsec
____ uses two mechanisms ESP and AH
500
IPsec uses port _____
51
AH uses port _____
50
ESP uses port ____
transport mode
IPsec ______ mode, end to end tunneling
tunnel mode
IPsec _____ mode, gateway to gateway tunneling
onion routing
_____ involves using subscriber computers to route data packets over the
internet, instead of using publicly available routers.
tor network

, the routing is done using computers of volunteers around the world to route the
traffic around the Internet, and within each hop the chances to trace the original
source significantly reduces.
original IP header
IPSec transport mode involves using _____ for routing.
New IP Header
IPSec tunnel mode involves using _____ for routing.
NOBUS
_______ is a back door created by the NSA
key escrow
_____ is where a copy of the encryption key is kept in escrow so that it can be
used by a government agent
exhaustive search
attacker uses brute force
know plain text attack
where the intruder uses knows part of the ciphertext and the corresponding
plaintext
chosen cipher text
is where the attacker produces cipher text and then sends it through a decryption
process to see the resulting plaintext
active attack
Where the intruder inserts or modifies messages.
replay attack
A type of network attack where an attacker
captures network traffic and stores it for
retransmission at a later time
cut and paste attack

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
luzlinkuz Chamberlain University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1426
Member since
4 year
Number of followers
849
Documents
27616
Last sold
18 hours ago

3.7

303 reviews

5
131
4
61
3
54
2
17
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions