Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following statements about biometric authentication is true?

A.

A user provides his user name and password for authentication.

B.

A user uses a smart card for authentication.

C.

A sensor scans some physical characteristics of a user and sends that information to the authentication server.

D.

A user is issued a device that is used for authentication.

Which of the following classes of IP addresses allows a maximum of 2,097,152 networks?

A.

Class C

B.

Class B

C.

Class D

D.

Class A

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

A.

Only users within the company.

B.

Anyone can authenticate.

C.

Only users with the correct WEP key.

D.

Only the administrator.

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Which of the following tools is used to flood the local network with random MAC addresses?

A.

NETSH

B.

NMAP

C.

Port scanner

D.

Macof

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

A.

Password policies

B.

Vulnerability assessments

C.

Data classification

D.

Data encryption

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true?

Each correct answer represents a complete solution. Choose two.

A.

It is used to provide host name resolution in a TCP/IP-based network.

B.

It is used to dynamically assign IP addresses to computers.

C.

It reduces the complexity of managing network client IP address configuration.

D.

It reduces the risk of a denial of service (DoS) attack.

Which of the following is the main reason for implementing CCTV as part of the physical arrangement?

A.

Authenticating users

B.

Securing data

C.

Increasing guard visibility

D.

Preventing criminal activities

What are the benefits of using a proxy server on a network?

Each correct answer represents a complete solution. Choose all that apply.

A.

It enhances network security.

B.

It cuts down dial-up charges.

C.

It is used for automated assignment of IP addresses to a TCP/IP client in the domain.

D.

It uses a single registered IP address for multiple connections to the Internet.

Which of the following VPN protocols offer encryption?

Each correct answer represents a complete solution. Choose two.

A.

L2F

B.

PPTP

C.

L2TP

D.

IPSec

Which of the following is required to be backed up on a domain controller to recover Active Directory?

A.

Installed third party application's folders

B.

User's personal data

C.

Operating System files

D.

System state data

Which of the following is ensured by the concept of availability in information system security?

A.

Data modifications are not made by an unauthorized user or process.

B.

The intentional or unintentional unauthorized disclosure of a message or important document contents is prevented.

C.

The systems are up and running when they are needed.

D.

Unauthorized modifications are not made by authorized users.

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

A.

Data service

B.

Account service

C.

Ticket-granting service

D.

Authentication service

Which of the following tools is used for breaking digital watermark?

A.

TRACERT

B.

Trin00

C.

Fpipe

D.

2Mosaic