PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What authentication methods can you use for this implementation?

In your office, you are building a new wireless network that contains Windows 2003 servers. To
establish a network for secure communication, you have to implement IPSec security policy on the
servers. What authentication methods can you use for this implementation? Each correct answer
represents a complete solution. Choose all that apply.

Which of the following statements are true about the Kerberos authentication scheme?

Kerberos is a computer network authentication protocol that allows individuals communicating over
a non-secure network to prove their identity to one another in a secure manner. Which of the
following statements are true about the Kerberos authentication scheme? Each correct answer
represents a complete solution. Choose all that apply.

What type of attack has just occurred?

A helpdesk technician received a phone call from an administrator at a remote branch office. The
administrator claimed to have forgotten the password for the root account on UNIX servers and
asked for it. Although the technician didn’t know any administrator at the branch office, the guy

sounded really friendly and since he knew the root password himself, he supplied the caller with the
password. What type of attack has just occurred?

Which of the following components reduces the size of data transmitted over congested network connections and

The IPSec protocol is configured in an organization’s network in order to maintain a complete
infrastructure for secured network communications. IPSec uses four components for this. Which of
the following components reduces the size of data transmitted over congested network connections
and increases the speed of such networks without losing data?


Page 542 of 1,070« First...102030...540541542543544...550560570...Last »