what allows for the multiple methods of user authentication?
In 802.1x, what allows for the multiple methods of user authentication?
what will the attacker need?
You are evaluating the security of different wireless media, and are considering an infrared
solution. If an attacker is trying to gain access to an infrared transmission, what will the attacker
need?
What are the two types of microwave transmissions used in commercial wireless networking?
You are evaluating the security of different wireless media, and are considering the use of
microwave technology. What are the two types of microwave transmissions used in commercial
wireless networking?
What do wireless access points use to counter multipath interference?
In your office, you are building the new wireless network, and you will need to install several
access points. What do wireless access points use to counter multipath interference?
What transmission system uses multiple frequencies combined together as a band?
There are several options available to you for your new wireless networking technologies, and you
are examining how different systems function. What transmission system uses multiple
frequencies combined together as a band?
Which of the following commands would you use during the creation of such a rule?
You are working on your companys IPTables Firewall, and you wish to create a rule to address the
denial of ICMP requests and messages to your machine. Which of the following commands would
you use during the creation of such a rule?
which of the following?
You have found a user in your organization who has managed to gain access to a system that this
user was not granted the right to use. This user has just provided you with a working example of
which of the following?
What is the function of BASE on your Snort machine?
You have configured Snort and MySQL on your SuSe Linux machine. You wish to enhance the
system by using BASE. What is the function of BASE on your Snort machine?
which of the following programs?
You are going to add another computer to the pool that you use for detecting intrusions. This time
you are making a customized Snort machine running on Windows Server 2003. Prior to running
Snort you must install which of the following programs?
What are the two major components of network security that an IDS can meet?
You are configuring the new Intrusion Detection System at your office. Your CEO asks you what
the IDS will do for the organization. You tell the CEO about the three main components of Network
Security and explain how an IDS can be used to meet two of those components. What are the two
major components of network security that an IDS can meet?