11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Started on Thursday, 7 November 2024, 10:07 AM
State Finished
Completed on Thursday, 7 November 2024, 10:14 AM
Time taken 7 mins 2 secs
Marks 18.00/20.00
Grade 90.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
This authentication method can be used on networks that include systems running an earlier version of the Windows operating
system and on standalone systems.
Select one:
a. Computer certificate
b. Pre-shared key
c. Computer (NTLMv2)
d. Computer (Kerberos V5)
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
his algorithm is not recommended and is provided for backward compatibility only.
Select one:
a. Diffie-Hellman Group 14 (DH Group 14)
b. Diffie-Hellman Group 24 (DH Group 24)
c. Diffie-Hellman Group 1 (DH Group 1)
d. Diffie-Hellman Group 2 (DH Group 2)
Your answer is correct.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 1/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 3
Correct
Mark 1.00 out of 1.00
Use IPsec Defaults option to configure the default IPsec settings that the local computer will use when attempting to establish secure
connections with other IPsec-enabled computers. To configure these settings, click the Customize button to open the Custo
Select one:
True
False
Question 4
Correct
Mark 1.00 out of 1.00
This algorithm is stronger than DH Group 2. It has medium resource usage and is compatible only with Windows Vista and later.
Select one:
a. Elliptic Curve Diffie-Hellman P-256
b. DH Group 24
c. Elliptic Curve Diffie-Hellman P-384
d. Diffie-Hellman Group 1 (DH Group 1)
Your answer is correct.
Question 5
Incorrect
Mark 0.00 out of 1.00
his algorithm has the strongest security but also the highest resource usage. It is compatible only with Windows Vista and later.
Select one:
a. Elliptic Curve Diffie-Hellman P-256
b. Diffie-Hellman Group 1 (DH Group 1)
c. DH Group 24
d. Elliptic Curve Diffie-Hellman P-384
Your answer is incorrect.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 2/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 6
Correct
Mark 1.00 out of 1.00
Which on is the first step In windows server 2012 routing/nat configuration?
Select one:
a. On Server Selection select the server you want to install the feature on and click Next.
b. From Server Manager click Manage > Add Roles and Features.
c. Select Role-based or feature-based installation and click Next.
d. On the Before You Begin page, click Next.
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
The Server-to-Server type of connection security rule can be used to protect communications between two computers, two groups of
computers, two subnets, or some combination of these, such as between a computer and a subnet. For example, you can use
serverto-server rules to protect communications between a database server and a front-end web server
Select one:
True
False
Question 8
Correct
Mark 1.00 out of 1.00
Which on is the fourth step In windows server 2012 routing/nat configuration?
Select one:
a. from Server Manager click Manage > Add Roles and Features
b. On the Before You Begin page, click Next.
c. Select Role-based or feature-based installation and click Next
d. On Server Selection select the server you want to install the feature on and click Next
Your answer is correct.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 3/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 9
Correct
Mark 1.00 out of 1.00
This data integrity algorithm is stronger than MD5 but uses more resources.
Select one:
a. Secure Hash Algorithm 1 (SHA-1)
b. AES-GMAC 192
c. SHA 256-bit (SHA-256)
d. Advanced Encryption Standard-Galois Message AuthenticationCode 128 bit (AES-GMAC 128)
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
This data integrity algorithm is not recommended and is provided for backward compatibility only.
Select one:
a. Message-Digest algorithm 5 (MD5)
b. SHA-384
c. SHA 256-bit (SHA-256)
d. Secure Hash Algorithm 1 (SHA-1)
Your answer is correct.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 4/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 11
Correct
Mark 1.00 out of 1.00
Which on is the third step In windows server 2012 routing/nat configuration?
Select one:
a. On the Before You Begin page, click Next
b. To start, from Server Manager click Manage > Add Roles and Features
c. Select Role-based or feature-based installation and click Next
d. On Server Selection select the server you want to install the feature on and click Next.
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Use IPsec Exemptions option to configure how IPsec handles Internet Control Message Protocol (ICMP) traffic. By default, ICMP traffic
is not exempted from using IPsec, but you can change this by selecting Yes from the list control.
Select one:
True
False
Question 13
Correct
Mark 1.00 out of 1.00
IPsec encapsulation mode where the payload is encapsulated with an additional IP header
Select one:
a. Quick Mode
b. Tunnel mode
c. Transport mode
d. Main Mode
Your answer is correct.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 5/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 14
Correct
Mark 1.00 out of 1.00
AES-GCM 191 This algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to
AESGMAC 128 for integrity.
Select one:
True
False
Question 15
Correct
Mark 1.00 out of 1.00
This mechanism is defined in RFC2409 and combines the Internet Security Association and Key Management Protocol
(ISAKMP) of RFC 2408 with the Oakley Key Determination Protocol (Oakley) of RFC 2412
Select one:
a. Internet Key Exchange (IKE)
b. Diffie-Hellman Group 1
c. IP Tunneling
d. Authenticated IP (AuthIP)
Your answer is correct.
Question 16
Incorrect
Mark 0.00 out of 1.00
IPsec Encapsulation Model where the payload is encapsulated with an IPsec header
Select one:
a. Tunnel mode
b. Transport mode
c. Handshake Mode
d. Key Mode
Your answer is incorrect.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 6/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 17
Correct
Mark 1.00 out of 1.00
AES-GCM 192 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to
AESGMAC 192 for integrity
Select one:
True
False
Question 18
Correct
Mark 1.00 out of 1.00
AES-GCM 256 algorithm can be used for quick mode only and is supported on Windows Vista SP1 and later. It is equivalent to
AESGMAC 256 for integrity.
Select one:
True
False
Question 19
Correct
Mark 1.00 out of 1.00
The default signing algorithm for this authentication method is RSA, but Elliptic Curve Digital Signature Algorithm (ECDSA)–P256 and
ECDSA-P384 are also supported signing algorithms.
Select one:
a. Pre-shared key
b. Computer (NTLMv2)
c. Computer certificate
d. Computer health certificate
Your answer is correct.
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 7/8
11/16/24, 8:42 AM Midterm Quiz 2: Attempt review
Question 20
Correct
Mark 1.00 out of 1.00
Which on is the second step In windows server 2012 routing/nat configuration?
Select one:
a. On the Before You Begin page, click Next.
b. from Server Manager click Manage > Add Roles and Features
c. Select Role-based or feature-based installation and click Next
d. On Server Selection select the server you want to install the feature on and click Next
Your answer is correct.
◄ What is IPSec?
Jump to...
Midterm Lab Quiz 2 ►
https://trimestral.amaesonline.com/2413/mod/quiz/review.php?attempt=191063&cmid=4362 8/8