Match each item with an statement below:
A. UNIX-based command interface and protocol for securely accessing a remote computer.
B. can provide intelligent traffic and bandwidth management based on the content of a session and not just on network connections.
C. encrypts both the header and the data portion.
D. "plain" HTTP sent over SSL/TLS.
E. the end of the tunnel between VPN devices.
F. handles setting up the connection with the remote VPN server and takes care of the special data handling required to send and receive data through the VPN tunnel.
G. most widely deployed tunneling protocol.
H. encrypts all files or selected directories and files on a Linux system.
I. one of the ways to reduce the risk of FTP attack.
A. SSH
B. Layer 4-7 device
C. IPsec tunnel mode
D. HTTPS
E. Endpoint
F. VPN Client
G. PPTP
H. CFS
I. Secure FTP (SFTP)
You might also like to view...
What is the major difference between the ext2 and ext3 file systems?
What will be an ideal response?
____ audits utilize an external group of individuals who are hired or employed by the government or other standard-setting groups for the purpose of conducting an audit.
A. Standard B. Policy C. Automated D. Formal
Only visible worksheet tabs can be grouped
Indicate whether the statement is true or false.
Times New Roman Bold 12 pt. is a typeface.
Answer the following statement true (T) or false (F)