Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

A.

Technical

B.

Administrative

C.

Automatic

D.

Physical

Which of the following is an open source network intrusion detection system?

A.

Sourcefire

B.

NETSH

C.

Macof

D.

Snort

Which of the following protocols is used as the directory access protocol?

A.

HDAP

B.

NNTP

C.

FTP

D.

LDAP

Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?

A.

64-bit

B.

16-bit

C.

32-bit

D.

128-bit

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Which of the following authentication methods support mutual authentication?

Each correct answer represents a complete solution. Choose two.

A.

MS-CHAP v2

B.

EAP-TLS

C.

EAP-MD5

D.

NTLM

Which of the following refers to encrypted text?

A.

Plaintext

B.

Cookies

C.

Hypertext

D.

Ciphertext

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.

UDP port 1701

B.

UDP port 161

C.

TCP port 443

D.

TCP port 110

Which of the following protocols is used to verify the status of a certificate?

A.

CEP

B.

HTTP

C.

OSPF

D.

OCSP

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Which of the following statements about Due Care policy is true?

A.

It provides information about new viruses.

B.

It is a method used to authenticate users on a network.

C.

It identifies the level of confidentiality of information.

D.

It is a method for securing database servers.

Which of the following is used to implement a procedure to control inbound and outbound traffic on a network?

A.

Sam Spade

B.

NIDS

C.

ACL

D.

Cookies

Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?

A.

Passive detection

B.

Event detection

C.

Active detection

D.

Packet detection

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

A.

Rename the Administrator account.

B.

Remove the Administrator account.

C.

Disable the Guest account.

D.

Enable the Guest account.

Which of the following statement about eavesdropping is true?

A.

It is a type of password guessing attack.

B.

It is a way of preventing electronic emissions that are generated from a computer or network.

C.

It is known as network saturation attack or bandwidth consumption attack.

D.

It is the process of hearing or listening in private conversations.