What will you implement to accomplish this?

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?A . Microsoft Internet Information Server (IIS)B . VPNC . FTP serverD . Certificate serverView...

August 14, 2020 No Comments READ MORE +

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?A . AuthenticationB . Non-repudiationC . IntegrityD . ConfidentialityView AnswerAnswer: D

August 13, 2020 No Comments READ MORE +

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?A . RCOB . RTOC . RPOD . RTAView AnswerAnswer: B

August 13, 2020 No Comments READ MORE +

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?A . Structured walk-through testB . Simulation testC . Full-interruption testD . Parallel testView AnswerAnswer: C

August 13, 2020 No Comments READ MORE +

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?A . IPSecB . L2TPC . LEAPD . ISAKMPView AnswerAnswer: D

August 13, 2020 No Comments READ MORE +

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?A . Man trapB . Biometric deviceC . Host Intrusion Detection System (HIDS)D . Network Intrusion Detection System (NIDS)View AnswerAnswer: A

August 13, 2020 No Comments READ MORE +

Which of the following should you choose?

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?A . AESB . SHAC . EAPD . CRC32View AnswerAnswer: B

August 12, 2020 No Comments READ MORE +

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?A . IntegrityB . ConfidentialityC . AuthenticationD . Non-repudiationView AnswerAnswer: D

August 12, 2020 No Comments READ MORE +

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.A . Using public key infrastructure authentication.B . Using basic authentication.C . Using Secret keys for authentication.D . Using Off-channel verification.View AnswerAnswer: ACD

August 12, 2020 No Comments READ MORE +

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.A . User's groupB . File and data ownershipC . Smart cardD . Access rights and permissionsView AnswerAnswer: BD

August 12, 2020 No Comments READ MORE +