Which of the following network topologies will you use to accomplish the task?

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?A . Bus topologyB . Fully meshed...

August 12, 2020 No Comments READ MORE +

Which of the following processes fulfills the above requirements?

An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?A . Key escrowB . Key...

August 12, 2020 No Comments READ MORE +

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?A . Hot SiteB . Mobile SiteC . Warm SiteD . Cold SiteView AnswerAnswer: A

August 11, 2020 No Comments READ MORE +

What authentication methods can you use for this implementation?

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all...

August 11, 2020 No Comments READ MORE +

On which of the following layers of the OSI reference model do these routers filter information?

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct...

August 11, 2020 No Comments READ MORE +

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.A . It uses symmetric key pairs.B . It provides security using data encryption and digital signature.C . It uses asymmetric key pairs.D . It is a digital representation of...

August 11, 2020 No Comments READ MORE +

Which of the following locations must have a camera in order to provide the minimum level of security for the network resources?

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.A . Parking lotB...

August 11, 2020 No Comments READ MORE +

Which of the following encryption methods does IPsec VPN use?

IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.A . MD5B . LEAPC . AESD . 3DESView AnswerAnswer: DC

August 11, 2020 No Comments READ MORE +

Which of the following cryptographic algorithms is being used by the We-are-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the­middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the...

August 11, 2020 No Comments READ MORE +

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Which of the following protocols uses public-key cryptography to authenticate the remote computer?A . SSHB . TelnetC . SCPD . SSLView AnswerAnswer: A

August 11, 2020 No Comments READ MORE +