Which of the following are the centralized administration technologies?
Which
of the following are the centralized administration technologies? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following categories of implementation of the access control includes all these security services
You are implementing some security services in an organization, such as smart cards, biometrics, access
control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following
categories of implementation of the access control includes all these security services?
Which of the following devices will you use to physically connect the computers in the VLAN?
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the
company. Which of the following devices will you use to physically connect the computers in the
VLAN?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the Network layer of the OSI model?
Which
of the following protocols work at the Network layer of the OSI model?
Which of the following are used to suppress paper or wood fires?
Which of the following are used to suppress paper or wood fires? Each correct answer represents a
complete solution. Choose two.
Which of the following WAN technologies will Mark use to connect the offices?
Mark
works as a Network Administrator for NetTech Inc. He wants to connect the company’s headquarter
and its regional offices using a WAN technology. For this, he uses packet-switched connection.
Which of the following WAN technologies will Mark use to connect the offices? Each correct answer
represents a complete solution. Choose two.
____________ is a system, which enables an authority to control access to areas and resources in a given physi
Fill
in the blank with the appropriate security method.
____________ is a system, which enables an authority to control access to areas and resources in a
given physical facility, or computerbased information system.
which of the following types of tests are the disaster recovery checklists distributed to…?
In which of the following types of tests are the disaster recovery checklists distributed to the members
of disaster recovery team and asked to review the assigned checklist?
Which of the following heights of fence deters only casual trespassers?
Which of the following heights of fence deters only casual trespassers?
which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have
In which of the following cryptographic attacking techniques does an attacker obtain encrypted
messages that have been encrypted using the same encryption algorithm?