Which of the following types of trust models is used by a PKI?
Which of the following types of trust models is used by a PKI?
Which of the following is the BEST way to accomplish this?
A company wants to make sure that users are required to authenticate prior to being allowed on the
network. Which of the following is the BEST way to accomplish this?
which of the following?
RC4 is a strong encryption protocol that is generally used with which of the following?
which of the following subnet masks should Joe use for this subnet?
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected
routers. In order to conserve address space, which of the following subnet masks should Joe use for
this subnet?
Which of the following MUST be implemented?
A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?
Which of the following utilities will identify if the workstation uses DHCP?
An administrator only has telnet access to a remote workstation. Which of the following utilities will
identify if the workstation uses DHCP?
Which of the following options should Joe configure in the DHCP scope…?
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following
options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using
dynamic IP addresses, to be able to access the Internet and internal company servers? (Select
THREE).
Which of the following can the administrator do to decrypt the file?
A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?
Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?
Which of the following protocols uses label-switching routers and label-edge routers to forward
traffic?
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user
authentication and the files the user is sending using only a user ID and a key pair. Which of the
following methods would achieve this goal?