Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

Data encrypted by the public key can only be decrypted by the secret key.

D.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

Which of the following logs contains events pertaining to security as defined in the Audit policy?

A.

DNS server log

B.

Application log

C.

System log

D.

Directory Service log

E.

Security log

F.

File Replication Service log

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

A.

Technical representative

B.

Legal representative

C.

Lead investigator

D.

Information security representative

Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?

A.

Cisco Discovery Protocol (CDP)

B.

Spanning Tree Protocol (STP)

C.

File Transfer Protocol (FTP)

D.

VLAN Trunking Protocol (VTP)

The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

A.

Sending deceptive e-mails

B.

Sending notifications

C.

Shunning

D.

Logging

E.

Spoofing

F.

Network Configuration Changes

You are the project manager for BlueWell Inc. You are reviewing the risk register for your project. The risk register provides much information to you, the project manager and to the project team during the risk response planning. All of the following are included in the risk register except for which item?

A.

Trends in qualitative risk analysis results

B.

Symptoms and warning signs of risks

C.

List of potential risk responses

D.

Network diagram analysis of critical path activities

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

A.

Corrective controls

B.

Detective controls

C.

Safeguards

D.

Preventive controls

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Cryptography

B.

OODA loop

C.

Risk analysis

D.

Firewall security

Which of the following are the goals of the cryptographic systems?

Each correct answer represents a complete solution. Choose three.

A.

Availability

B.

Authentication

C.

Confidentiality

D.

Integrity

John works as a Network Administrator for Bordeaux Inc. He is planning to design a strategy, so that the employees can connect to a scheduling application. Which of the following strategies is best suited for the company?

(Click the Exhibit button on the toolbar to see the case study.)

A.

Deploy a VPN server on the VLAN network, and an IIS server on the corporate LAN at the headquarters.

B.

Deploy a VPN server on the VLAN network, and an IIS server on DMZ.

C.

Deploy a VPN server on the corporate LAN at the headquarters, and an IIS server on DMZ.

D.

Deploy a VPN server on DMZ, and an IIS server on the corporate LAN at the headquarters.