Which of the following will you use to accomplish this?
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?A . PGPB . PPTPC . IPSecD . NTFSView AnswerAnswer: A
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.A . Public keyB . IPsecC . MS-CHAPD . SymmetricView AnswerAnswer: DA
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?A . The transport layerB . The presentation layerC . The session layerD . The application layerView AnswerAnswer: A
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following types of attacks cannot be prevented by technical measures only?A . Social engineeringB . Brute forceC . Smurf DoSD . Ping flood attackView AnswerAnswer: A
Which of the following principles does the SOMF concentrate on?
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.A . Disaster recovery planningB . SOA value propositionC ....
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.A . It typically executes at a higher speed than a block cipher.B . It divides a message into blocks for processing.C . It typically executes at a slower speed than...
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?A . RSTPB . SKIPC . OCSPD . HTTPView AnswerAnswer: C
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?A . Network-basedB . Anomaly-basedC . File-basedD . Signature-basedView AnswerAnswer: B
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Which of the following authentication methods prevents unauthorized execution of code on remote systems?A . TACACSB . S-RPCC . RADIUSD . CHAPView AnswerAnswer: B
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?A . Ring topologyB . Tree topologyC . Star topologyD . Mesh topologyView AnswerAnswer: A