Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
Which of the following is an open source network intrusion detection system?
Which of the following protocols is used as the directory access protocol?
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?
Which of the following authentication methods support mutual authentication?
Each correct answer represents a complete solution. Choose two.
Which of the following refers to encrypted text?
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
Which of the following protocols is used to verify the status of a certificate?
Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?
Which of the following statements about Due Care policy is true?
Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?
Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?
Each correct answer represents a complete solution. Choose two.
Which of the following statement about eavesdropping is true?