Which of the following protocols is used by VPN for tunneling?
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The
company has two offices in different cities. The company wants to connect the two offices by using a
public network. You decide to configure a virtual private network (VPN) between the offices. Which
of the following protocols is used by VPN for tunneling?
Which of the following stages in the Incident handling process involves your decision making?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of
your enterprise. The networking, to be done in the new extension, requires different types of cables
and an appropriate policy that will be decided by you. Which of the following stages in the Incident
handling process involves your decision making?
Which of the following topologies should John use to accomplish the task?
John
works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network.
John has been assigned a project to build a network for the sales department of the company. It is
important for the LAN to continue working even if there is a break in the cabling. Which of the
following topologies should John use to accomplish the task?
Which of the following security models focuses on data confidentiality and controlled access to classified inf
Which of the following security models focuses on data confidentiality and controlled access to
classified information?
Which of the following security models focuses on data confidentiality and controlled access to classified inf
Which of the following security models focuses on data confidentiality and controlled access to
classified information?
Which of the following encryption algorithms are based on block ciphers?
Which
of the following encryption algorithms are based on block ciphers?
What is the process of using a strategy and plan of what patches should be applied to…
Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan
of what patches should be applied to which systems at a specified time.
Correct
Which of the following recovery plans includes specific strategies and actions…?
Which of the following recovery plans includes specific strategies and actions to deal with specific
variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
Which of the following recovery plans includes specific strategies and actions…?
Which of the following recovery plans includes specific strategies and actions to deal with specific
variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the t
Which of the following BCP teams handles financial arrangement, public relations, and media
inquiries in the time of disaster recovery?