Which of the following protocols should he disable to ensure that the password is encrypted during remote access?
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?A . SPAPB . MSCHAPC...
Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?A . Risk analysisB . Firewall securityC...
Which of the following types of firewall functions at the Session layer of OSI model?
Which of the following types of firewall functions at the Session layer of OSI model?A . Circuit-level firewallB . Application-level firewallC . Packet filtering firewallD . Switch-level firewallView AnswerAnswer: A
Which one of the following would have been most effective in preventing this?
You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and...
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?A . CHAPB . PEAPC . EAPD . EAP-TLSView AnswerAnswer: A
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?A . Social engineering attackB . Cross site scripting attackC . Mail bombingD . Password guessing attackView AnswerAnswer: A
Which of the following techniques will she use to fulfill this requirement?
Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?A . IDEAB . PGPC...
Which of the following technologies will you implement to accomplish the task?
You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to...
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?A . HackingB . Packet filteringC . Web cachingD . SpoofingView AnswerAnswer: B
Which of the following should you use?
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?A . AESB . SHAC . MD5D . DESView AnswerAnswer: C