Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements about Encapsulating Security Payload (ESP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B.

It is an IPSec protocol.

C.

It is a text-based communication protocol.

D.

It uses TCP port 22 as the default port and operates at the application layer.

Which of the following is the main purpose of using OODA loops?

A.

Providing economic balance

B.

Making the information delivery process faster

C.

Information welfare

D.

Creating advanced military weapons

Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?

A.

Data mining

B.

Back-up

C.

Data recovery

D.

File storage

Which of the following is the primary function of VPNs?

A.

To establish private connections over public networks

B.

To make virtual connections for remote access

C.

To establish a wireless connections to networks

D.

To access networks remotely

Which of the following best describes the identification, analysis, and ranking of risks?

A.

Design of experiments

B.

Fast tracking

C.

Fixed-price contracts

D.

Plan Risk management

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

A.

Packet filtering

B.

Authentication

C.

Firewall

D.

Digital signature

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.

Which of the following is the fastest and the most effective way to accomplish the task?

A.

Apply firewall settings manually.

B.

Apply firewall settings on the domain controller of the domain.

C.

Use group policy to apply firewall settings.

D.

Use a batch file to apply firewall setting.

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

A.

Preparation phase

B.

Eradication phase

C.

Differential phase

D.

Identification phase

Which of the following refers to encrypted text?

A.

Plaintext

B.

Cookies

C.

Ciphertext

D.

Hypertext

At which OSI layer does UDP operate?

A.

Network layer

B.

Data-link layer

C.

Session layer

D.

Transport layer

E.

Presentation layer