What mode of ESP does Jacob need to use to encrypt the IP traffic?

The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol...

August 6, 2024 No Comments READ MORE +

How will they ensure the authenticity of their emails?

Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?A . Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature...

August 6, 2024 No Comments READ MORE +

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?A . Pipe ModelB . AAA modelC . Hub-and-Spoke VPN modelD . Hose modeView AnswerAnswer: A Explanation: The Pipe Model in VPN QoS is designed to guarantee bandwidth between one customer edge (CE) device to another. This...

August 6, 2024 No Comments READ MORE +

Unsuccessful scans and probes are at what severity level?

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?A . Extreme...

August 5, 2024 No Comments READ MORE +

What is this type of server called?

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and...

August 5, 2024 No Comments READ MORE +

What does this source address signify?

Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?A . This address means that the source is using an IPv6...

August 4, 2024 No Comments READ MORE +

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.A . SANB . SCSAC . NASD . SASView AnswerAnswer: A Explanation: Storage Area Network...

August 4, 2024 No Comments READ MORE +

What is/are the reason(s) Alex is suggesting that James use a differential backup?

The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him...

August 4, 2024 No Comments READ MORE +

What TCP/IP layer does a packet filtering firewall work on?

John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?A . Application layerB . Network Interface layerC . TCP layerD . IP layerView AnswerAnswer: D Explanation: A packet filtering firewall operates at the network layer of the TCP/IP...

August 4, 2024 No Comments READ MORE +

What should James use?

James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company schools, and lenders is carried out through emails. Much of the email communication used at his company...

August 4, 2024 No Comments READ MORE +