Which of the following protocols should he disable to ensure that the password is encrypted during remote acce
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to
configure a dial-up connection. He is configuring a laptop. Which of the following protocols should
he disable to ensure that the password is encrypted during remote access?
Which of the following disaster recovery tests includes the operations that shut down at the primary site̷
Which of the following disaster recovery tests includes the operations that shut down at the
primary site, and are shifted to the recovery site according to the disaster recovery plan?
which of the following network topologies does the data travel around a loop in a single direction and pass th
In which of the following network topologies does the data travel around a loop in a single direction
and pass through each device?
Which of the following should you choose?
You are the Network Administrator for a small business. You need a widely used, but highly
secure hashing algorithm. Which of the following should you choose?
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or
Which of the following can be configured so that when an alarm is activated, all doors lock and the
suspect or intruder is caught between the doors in the dead-space?
Which of the following refers to a location away from the computer center where document copies and backup med
Which of the following refers to a location away from the computer center where document copies
and backup media are kept?
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy,
Which of the following encryption methods does the SSL protocol use in order to provide
communication privacy, authentication, and message integrity? Each correct answer represents a
part of the solution. Choose two.
Which of the following techniques is he performing to accomplish his task?
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from
the company for personal reasons. He wants to send out some secret information of the company.
To do so, he takes an image file and simply uses a tool image hide and embeds the secret file
within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since
he is using the image file to send the data, the mail server of his company is unable to filter this
mail. Which of the following techniques is he performing to accomplish his task?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an e
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
Which of the following are the initial steps required to perform a risk analysis process?
Which of the following are the initial steps required to perform a risk analysis process? Each
correct answer represents a part of the solution. Choose three.