Which of the following protocols uses public-key cryptography to authenticate the remote computer?
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?
Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?
Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.
Which of the following types of halon is found in portable extinguishers and is stored as a liquid?
Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?