Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
which layer of OSI model is the File and Print service performed?
The OSI reference model is divided into layers and each layer has a specific task to perform. At which
layer of OSI model is the File and Print service performed?
Which of the following cables provides maximum security against electronic eavesdropping on a network?
Which of the following cables provides maximum security against electronic eavesdropping on a
network?
Which of the following password authentication schemes enables a user with a domain account…?
Which of the following password authentication schemes enables a user with a domain account to
log on to a network once, using a
password or smart card, and to gain access to multiple computers in the domain without being
prompted to log in again?
Which of the following authentication methods provides credentials that are only valid during a single session
Which of the following authentication methods provides credentials that are only valid during a
single session?
Which of the following authentication protocols should be used to accomplish this?
Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to
connect to the network. For security purposes, the company’s management wants the sales
managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to
accomplish this?
which of the following disaster recovery tests can this task be performed?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?
What feature of a router would accomplish this?
Your customer is concerned about security. He wants to make certain no one in the outside world
can see the IP addresses inside his network. What feature of a router would accomplish this?
Which of the following are the likely reasons for the clustering?
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the
following are the likely reasons for the clustering?
Each correct answer represents a complete solution. Choose two.
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Each correct answer represents a complete solution. Choose two.