Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
Which of the following describes a type of algorithm that cannot be reversed in order to decode the
data?
Which of the following would achieve this goal?
An administrator wants to implement a procedure to control inbound and outbound traffic on a
network segment. Which of the following would achieve this goal?
Which of the following freeware forensic tools is used to capture packet traffic from a network?
Which of the following freeware forensic tools is used to capture packet traffic from a network?
Which of the following is MOST likely occurring?
When reviewing traces from an IDS, the following entries are observed:
Date Time Source IP Destination IP Port Type
10/21 0900 192.168.5.2 10.10.2.1 20 SYN
10/21 0915 192.168.5.2 10.10.2.1 21 SYN
10/21 0920 192.168.5.2 10.10.2.1 23 SYN
10/21 0930 192.168.5.2 10.10.2.1 25 SYN
Which of the following is MOST likely occurring?
Which of the following protocols are not recommended due to them supplying passwords and information over the
Which of the following protocols are not recommended due to them supplying passwords and
information over the network?
Which of the following must be installed for HTTPS to work properly on a web site?
Which of the following must be installed for HTTPS to work properly on a web site?
Which solution should you implement?
You work as the security administrator. You want to implement a solution which will provide a
WLAN (Wireless Local Area Network) with the security typically associated with a wired LAN
(Local Area Network):
Which solution should you implement?
which is a tunneling protocol that can only work on IP networks because it requires IP connectivity?
From the options, which is a tunneling protocol that can only work on IP networks because it
requires IP connectivity?
Which of the following would be the BEST description of this program?
A user downloads and installs a new screen saver and the program starts to rename and delete
random files. Which of the following would be the BEST description of this program?
Which of the following BEST describes an attack that takes advantage of a computer not fully updated with the
Which of the following BEST describes an attack that takes advantage of a computer not fully
updated with the most recent operating system patches?