Similar to Secure Shell (SSH-2), Secure Sockets Layer (…
Similar to Secure Shell (SSH-2), Secure Sockets Layer (SSL) uses symmetric encryption for encrypting the
bulk of the data being sent over the session and it uses asymmetric or public key cryptography for:
Transport Layer Security (TLS) is a two-layered socket …
Transport Layer Security (TLS) is a two-layered socket layer security protocol that contains the TLS Record
Protocol and the:
which of the following?
Secure Sockets Layer (SSL) is very heavily used for protecting which of the following?
What is the maximum length of cable that can be used fo…
What is the maximum length of cable that can be used for a twisted-pair, Category 5 10Base-T cable?
Which of the following are well known ports assigned by…
Which of the following are well known ports assigned by the IANA?
An area of the Telecommunications and Network Security …
An area of the Telecommunications and Network Security domain that directly affects the Information Systems
Security tenet of Availability can be defined as:
One of the following statements about the differences b…
One of the following statements about the differences between PPTP and L2TP is NOT true
Which of the following should be used by Tim to ensure …
Tim is a network administrator of Acme Inc. He is responsible for configuring the network devices. John the
new security manager reviews the configuration of the Firewall configured by Tim and identifies an issue.
This specific firewall is configured in failover mode with another firewall. A sniffer on a PC connected to the
same switch as the firewalls can decipher the credentials, used by Tim while configuring the firewalls.
Which of the following should be used by Tim to ensure that no one can eavesdrop on the communication?
One of the following assertions is NOT a characteristic…
One of the following assertions is NOT a characteristic of Internet Protocol Security (IPSec)
which of the following?
Communications and network security relates to transmission of which of the following?