Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following terms is described by the statement given below?

"It allows the server to authenticate itself to the client by using public-key techniques. It then allows the client and server to cooperate in creating symmetric keys that are used for encryption, decryption, and tamper detection during the SSL session that follows."

A.

Secure Electronic Transaction (SET)

B.

Virtual Private Network (VPN)

C.

Secure Sockets Layer (SSL) Handshake

D.

Digital signature

Which of the following terms is synonymous with the willful destruction of another person's property?

A.

Hacking

B.

Vandalism

C.

Spoofing

D.

Phishing

You are installing Windows 2000 Server. You decide to use RAID-5 volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?

A.

Thirty-two

B.

Two

C.

Three

D.

One

Which of the following provides protection from attacks at the application layer and prevents unauthorized access and packet spoofing?

A.

Proxy server

B.

IPSec protocol

C.

Network address translation (NAT)

D.

STP cabling

Which of the following allows an administrator to find weak passwords on the network?

A.

Rainbow table

B.

Back door

C.

Worm

D.

Access control list

Which of the following statements is true about auditing?

A.

It is used to track user accounts for file and object access, logon attempts, etc.

B.

It is used to prevent unauthorized access to network resources.

C.

It is used to protect the network against virus attacks.

D.

It is used to secure the network or the computers on the network.

Which of the following statements about the availability concept of Information security management is true?

A.

It ensures that modifications are not made to data by unauthorized personnel or processes.

B.

It determines actions and behaviors of a single individual within a system.

C.

It ensures reliable and timely access to resources.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

Which of the following devices reads the destination's MAC address from each incoming data packet and forwards the data packet to its destination?

A.

Hub

B.

Router

C.

Brouter

D.

Switch

Which of the following handles a relatively wide range of frequencies, which may be divided into channels or frequency bins?

A.

Broadband transmission

B.

Multicast transmission

C.

Baseband transmission

D.

Unicast transmission

Which of the following are the levels of military data classification system?

Each correct answer represents a complete solution. Choose all that apply.

A.

Top Secret

B.

Sensitive

C.

Public

D.

Unclassified

E.

Secret

F.

Confidential

Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?

A.

Port Address Translation (PAT)

B.

Dynamic NAT

C.

Static NAT

D.

Cache NAT

Which of the following encryption algorithms are based on symmetric key cryptographic algorithms?

Each correct answer represents a complete solution. Choose all that apply.

A.

RC5

B.

AES

C.

DSA

D.

Blowfish

E.

IDEA

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Spoofing

B.

Cryptanalysis

C.

Steganography

D.

Packet sniffing

Which of the following provides the best protection against a man-in-the-middle attack?

A.

Strong encryption

B.

Fiber-optic cable

C.

Strong password

D.

Firewall