Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following principles does the SOMF concentrate on?
The service-oriented modeling framework (SOMF) provides a common modeling notation to
address alignment between business and IT organizations. Which of the following principles does the
SOMF concentrate on?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following networking devices will you use to accomplish the task?
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the
following networking devices will you use to accomplish the task?
What authentication methods can you use for this implementation?
In your office, you are building a new wireless network that contains Windows 2003 servers. To
establish a network for secure communication, you have to implement IPSec security policy on the
servers. What authentication methods can you use for this implementation? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following services are offered by the administrative physical security control group?
The security controls that are implemented to manage physical security are divided in various
groups. Which of the following services are offered by the administrative physical security control
group? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
Which of the following statements are true about the Kerberos authentication scheme?
Kerberos is a computer network authentication protocol that allows individuals communicating over
a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following solutions will be the best for the organization?
An organization is seeking to implement a hot site and wants to maintain a live database server at
the backup site. Which of the following solutions will be the best for the organization?
What type of attack has just occurred?
A helpdesk technician received a phone call from an administrator at a remote branch office. The
administrator claimed to have forgotten the password for the root account on UNIX servers and
asked for it. Although the technician didn’t know any administrator at the branch office, the guy
sounded really friendly and since he knew the root password himself, he supplied the caller with the
password. What type of attack has just occurred?
Which of the following utilities will you use to diagnose the problem?
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem.
Which of the following utilities will you use to diagnose the problem?