IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network Security 1.0AH does not provide data confidentiality (encryption).ITExamAnswers asked 2 years ago • Network Security 1.0ESP provides data authentication and integrity.ITExamAnswers asked 2 years ago • Network Security 1.0Which type of VPN is used when the telecommuter device is responsible for establishing the VPN?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of VPN is used when internal hosts have no knowledge that a VPN exists?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of VPN is used when both sides of the VPN connection are aware of the VPN configuration in advance?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of VPN is used when the host sends and receives normal TCP/IP traffic through a VPN gateway?ITExamAnswers asked 2 years ago • Network Security 1.0Which type of VPN supports dynamically changing connection information and can be enabled when needed?ITExamAnswers asked 2 years ago • Network Security 1.0Which characteristic is a mechanism that allows secure agreement on the keying material with the other party over an untrusted medium?ITExamAnswers asked 2 years ago • Network Security 1.0Which characteristic creates new keys for cryptography?ITExamAnswers asked 2 years ago • Network Security 1.0Which characteristic helps identify a weak key and regenerate a new replacement key?ITExamAnswers asked 2 years ago • Network Security 1.0What is the practice and study of determining the meaning of encrypted information, without access to the shared secret key?ITExamAnswers asked 2 years ago • Network Security 1.0What is the term for when a device cannot refute the validity of a message that it has received?ITExamAnswers asked 2 years ago • Network Security 1.0What cipher method does 3DES use as part of the algorithm?ITExamAnswers asked 2 years ago • Network Security 1.0What is a method of cryptanalysis in which an attacker tries every possible key knowing that eventually one of them will work?ITExamAnswers asked 2 years ago • Network Security 1.0What is a cipher that replaces one letter for another, possibly retaining the letter frequency of the original message?ITExamAnswers asked 2 years ago • Network Security 1.0