Which of the following will you recommend for providing security?
You work as a Network Administrator for uCertify Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security?
Where will the encryption key be located during the active user session?
You work as a network administrator for WebPerfect Inc. You configure both WPA and EAP authentications on a client computer in the company’s wireless network. Where will the encryption key be located during the active user session?
Each correct answer represents a part of the solution. Choose two.
Which of the following are social engineering techniques?
Which of the following are social engineering techniques? Each correct answer represents a complete solution. Choose all that apply.
What is the most likely problem?
Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?
Which of the following is an IPSec protocol that provides confidentiality with authentication, integrity, and
Which of the following is an IPSec protocol that provides confidentiality with authentication, integrity, and anti-replay?
Which of the following is a wireless device that is created to allow a cracker to conduct a man-in-the- middle
Which of the following is a wireless device that is created to allow a cracker to conduct a man-in-the- middle attack?
Which of the following are secure infrastructure management protocols used in WLAN?
Which of the following are secure infrastructure management protocols used in WLAN? Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?
Which of the following protocols is used by the Point-to-Point Protocol to validate users before allowing them
Which of the following protocols is used by the Point-to-Point Protocol to validate users before allowing them access to server resources?
Which of the following types of cyber crimes involves this form of network attack?
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e- mails. Which of the following types of cyber crimes involves this form of network attack?