Preview Mode — This PBQ requires a Premium Membership and is being shown in a read-only preview mode.     See Plans

Network Security Protocols and Technologies

Match networking protocols with their security functions and characteristics. Students will connect protocols and technologies with their appropriate security applications, encryption standards, and network protection capabilities.


802.1X
S/MIME
SSL
VPN
Kerberos
IPSec
PGP
TLS
RADIUS
SSH
WPA2
Delivers centralized authentication, authorization, and accounting services
Protects email communications with digital signatures and encryption
Authenticates users with a ticket-based system for enhanced security
Creates secure tunnels for remote network access via encrypted connections
Provides secure remote access and file transfer capabilities
Offered encryption for web traffic, now largely replaced by TLS
Secures IP communications with encryption and integrity verification
Enables secure web communication through data encryption and authentication
Implements port-based network access control through authentication protocols
Offers public key cryptography for securing emails and files
Secures wireless networks using AES encryption standards