Which of the following access control models will he use?
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?A . Policy Access ControlB . Mandatory Access ControlC . Discretionary Access ControlD . Role-Based Access ControlView AnswerAnswer: D
Which of the following types of encryption does SSL use?
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct...
Which type of attack is this?
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?A . Denial-of-Service attackB . Vulnerability attackC . Social Engineering attackD . Impersonation attackView AnswerAnswer: A
Which of the following statements best describes a certification authority?
Which of the following statements best describes a certification authority?A . A certification authority is a technique to authenticate digital documents by using computer cryptography.B . A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.C . A certification...
Which of the following techniques is he performing to accomplish his task?
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the...
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
Which of the following refers to a location away from the computer center where document copies and backup media are kept?A . Storage Area networkB . Off-site storageC . On-site storageD . Network attached storageView AnswerAnswer: B
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.A . Estimate the potential losses to assets by determining their value.B . Establish the threats likelihood and regularity.C . Valuations of the critical assets...
Which of the following attacks can be overcome by applying cryptography?
Which of the following attacks can be overcome by applying cryptography?A . Web rippingB . DoSC . SniffingD . Buffer overflowView AnswerAnswer: C
Which of the following is used to authenticate asymmetric keys?
Which of the following is used to authenticate asymmetric keys?A . Digital signatureB . MAC AddressC . Demilitarized zone (DMZ)D . PasswordView AnswerAnswer: A
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.A . GTCB . MS-CHAP v2C . AESD . RC4View AnswerAnswer: BA