Which of the following technologies will you implement to accomplish the task?
You work as a technician for Trade Well Inc. The company is in the business of share trading. To
enhance security, the company wants users to provide a third key (apart from ID and password) to
access the company’s Web site. Which of the following technologies will you implement to
accomplish the task?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP
model?
What is the most cost effective method to prevent this?
You are the Network Administrator for a college. You watch a large number of people (some not
even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You
have had a problem with laptops being stolen. What is the most cost effective method to prevent
this?
Which of the following physical security devices can now be used for verification and historical analysis of t
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security
devices can now be used for verification and historical analysis of the ATM robbery?
Which of the following should you use?
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically
used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the
following should you use?
Which of the following are the countermeasures against a man-in-the-middle attack?
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct
answer represents a complete solution. Choose all that apply.
Which of the following is an electrical event shows that there is enough power on the grid to prevent from a t
Which of the following is an electrical event shows that there is enough power on the grid to
prevent from a total power loss but there is no enough power to meet the current electrical
demand?
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WA
Which of the following protocols is designed to efficiently handle high-speed data over wide area
networks (WANs)?
Which of the following statements best describes a certification authority?
Which of the following statements best describes a certification authority?
which of the following alternative processing sites is the backup facility maintained in a constant order, wit
In which of the following alternative processing sites is the backup facility maintained in a constant
order, with a full complement of servers, workstations, and communication links ready to assume
the primary operations responsibility?