Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Which
of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Which of the following schemes is used by the Kerberos authentication?
Which
of the following schemes is used by the Kerberos authentication?
Which of the following is most appropriate for this client?
You
are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers
for the district they will need to be able to work from an alternate location. However, budget is an
issue. Which of the following is most appropriate for this client?
Which of the following are the centralized administration technologies?
Which
of the following are the centralized administration technologies? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following categories of implementation of the access control includes all these security services
You are implementing some security services in an organization, such as smart cards, biometrics, access
control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following
categories of implementation of the access control includes all these security services?
Which of the following devices will you use to physically connect the computers in the VLAN?
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the
company. Which of the following devices will you use to physically connect the computers in the
VLAN?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the Network layer of the OSI model?
Which
of the following protocols work at the Network layer of the OSI model?
Which of the following are used to suppress paper or wood fires?
Which of the following are used to suppress paper or wood fires? Each correct answer represents a
complete solution. Choose two.
Which of the following WAN technologies will Mark use to connect the offices?
Mark
works as a Network Administrator for NetTech Inc. He wants to connect the company’s headquarter
and its regional offices using a WAN technology. For this, he uses packet-switched connection.
Which of the following WAN technologies will Mark use to connect the offices? Each correct answer
represents a complete solution. Choose two.
____________ is a system, which enables an authority to control access to areas and resources in a given physi
Fill
in the blank with the appropriate security method.
____________ is a system, which enables an authority to control access to areas and resources in a
given physical facility, or computerbased information system.