At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?
At the beginning of an IPsec session, which activity occurs during the Internet Key Exchange (IKE)?A . Determining the number of security associationsB . Negotiating the authentication methodC . Determining the network identification numberD . Negotiating the version of IP to be usedView AnswerAnswer: B
Which of the following will accomplish this goal?
You want to create a quick solution that allows you to obtain real-time login information for the administrative account on an LDAP server that you feel may become a target. Which of the following will accomplish this goal?A . Reinstall the LDAP service on the server so that it is...
What is the primary advantage of using a circuit-level proxy?
What is the primary advantage of using a circuit-level proxy?A . It provides Network Address Translation (NAT).B . It can discriminate between good and malicious data.C . It allows applications to provide connection information to the SOCKS server.D . It allows masquerading.View AnswerAnswer: A
Which two protocols can be found at the transport layer of the TCP/IP stack?
Which two protocols can be found at the transport layer of the TCP/IP stack?A . File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP)B . Internet Protocol (IP) and Internet Control Message Protocol (ICMP)C . Post Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP)D . Transmission Control Protocol...
Which of the following has most likely occurred?
You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has...
Which of the following is the most likely explanation for this problem?
You purchased a network scanner six months ago. In spite of regularly conducting scans using this software, you have noticed that attackers have been able to compromise your servers over the last month. Which of the following is the most likely explanation for this problem?A . The network scanner needs...
Which of the following is a primary risk factor when authenticating with a standard HTTP server?
Irina has contracted with a company to provide Web design consulting services. The company has asked her to use several large files available via an HTTP server. The IT department has provided Irina with user name and password, as well as the DNS name of the HTTP server. She then...
Which of the following is the simplest, most common firewall design?
Which of the following is the simplest, most common firewall design?A . A dual-homed bastion hostB . A screening routerC . A screened subnetD . A single-homed bastion hostView AnswerAnswer: B
What may have occurred instead of the anticipated audit?
Danielle was informed by her network administrator that an audit may be conducted during the night to determine the hosts that exist on the network and document any open ports. The next day, Danielle was unable to access any network services. What may have occurred instead of the anticipated audit?A...
What distinguishes hash encryption from other forms of encryption?
What distinguishes hash encryption from other forms of encryption?A . Hash encryption creates a mathematically matched key pair in which one half of the pair encrypts, and the other half decrypts.B . Hash encryption creates a single key that is used to encrypt and decrypt information.C . Hash encryption is...