Which of the following access control models will he use?
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?
Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?
Which of the following encryption methods does IPsec VPN use?
IPsec VPN provides a high degree of data privacy by establishing trust points between
communicating devices and data encryption. Which of the following encryption methods does IPsec
VPN use?
Each correct answer represents a complete solution. Choose two.
Which type of attack is this?
A user is sending a large number of protocol packets to a network in order to saturate its resources
and to disrupt connections to prevent communications between services. Which type of attack is
this?
Which of the following types of firewall functions at the Session layer of OSI model?
Which of the following types of firewall functions at the Session layer of OSI model?
Which of the following statements about a stream cipher are true?
Which of the following statements about a stream cipher are true? Each correct answer represents
a complete solution. Choose three.
Which of the following types of attack can be used to break the best physical and logical security mechanism t
Which of the following types of attack can be used to break the best physical and logical security
mechanism to gain access to a system?
Which one of the following would have been most effective in preventing this?
You are the Security Consultant advising a company on security methods. This is a highly secure
location that deals with sensitive national defense related dat
a. They are very concerned about physical security as they had a breach last month. In that breach
an individual had simply grabbed a laptop and ran out of the building. Which one of the following
would have been most effective in preventing this?
Which of the following network topologies will you use to accomplish the task?
You want to implement a network topology that provides the best balance for regional topologies in
terms of the number of virtual circuits, redundancy, and performance while establishing a WAN
network. Which of the following network topologies will you use to accomplish the task?
Which of the following protocols is an alternative to certificate revocation lists (CRL)…?
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the
authenticity of a certificate to be immediately verified?
