Which of the following can be prevented by an organization using job rotation and separation of duties policies?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
Which of the following statements about active attack is true?
Which of the following are the application layer protocols for security?
Each correct answer represents a complete solution. Choose three.
Fill in the blank with the appropriate layer name of the OSI model.
Secure Socket Layer (SSL) operates at the _______ layer of the OSI model.
Which of the following is the best way of protecting important data against virus attack?
Which of the following statements about Digest authentication are true?
Each correct answer represents a complete solution. Choose two.
Which of the following have been developed to address security issues in the e-commerce system?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about Network Address Translation (NAT) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following languages enable programmers to store cookies on client computers?
Each correct answer represents a complete solution. Choose two.
Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?
Which of the following Windows RRAS authentication protocols uses completely unencrypted passwords?