Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Network Security Protocols and Technologies

Match networking protocols with their security functions and characteristics. Students will connect protocols and technologies with their appropriate security applications, encryption standards, and network protection capabilities.


SSL
IPSec
SSH
WPA2
Kerberos
PGP
VPN
S/MIME
TLS
RADIUS
802.1X
Secures wireless networks using AES encryption standards
Offers public key cryptography for securing emails and files
Enables secure web communication through data encryption and authentication
Creates secure tunnels for remote network access via encrypted connections
Secures IP communications with encryption and integrity verification
Implements port-based network access control through authentication protocols
Protects email communications with digital signatures and encryption
Provides secure remote access and file transfer capabilities
Offered encryption for web traffic, now largely replaced by TLS
Authenticates users with a ticket-based system for enhanced security
Delivers centralized authentication, authorization, and accounting services