Which of the following phases of the Incident handling process will now be involved in resolving this process
You work as an Incident handling manager for a company. The public relations process of the
company includes an event that responds to the e-mails queries. But since few days, it is identified
that this process is providing a way to spammers to perform different types of e-mail attacks. Which
of the following phases of the Incident handling process will now be involved in resolving this
process and find a solution?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following ports must be opened on the firewall for the VPN connection using Point-toPoint Tunneli
Which of the following ports must be opened on the firewall for the VPN connection using Point-toPoint Tunneling Protocol (PPTP)?
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit
Which of the following types of ciphers operates on a group of bits rather than an individual
character or bit of a message?
Which of the following plans is a comprehensive statement of consistent actions…?
Which of the following plans is a comprehensive statement of consistent actions to be taken before,
during, and after a disruptive event that causes a significant loss of information systems resources?
Which of the following techniques can be used by an administrator while working with the symmetric encryption
Which of the following techniques can be used by an administrator while working with the
symmetric encryption cryptography?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are types of access control attacks?
Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Which of the following is a form of gate that allows one person to pass at a time?
Which of the following is a form of gate that allows one person to pass at a time?
Which of the following algorithms can be used to check the integrity of a file?
Which of the following algorithms can be used to check the integrity of a file?
Each correct answer represents a complete solution. Choose two.
What will you do to accomplish this?
You work as a Network Administrator for NetTech Inc. The company’s network is connected to the
Internet. For security, you want to restrict unauthorized access to the network with minimum
administrative effort. You want to implement a hardware-based solution. What will you do
to accomplish this?