Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

A.

Service-oriented architecture

B.

Sherwood Applied Business Security Architecture

C.

Service-oriented modeling framework

D.

Service-oriented modeling and architecture

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

A.

It typically executes at a higher speed than a block cipher.

B.

It divides a message into blocks for processing.

C.

It typically executes at a slower speed than a block cipher.

D.

It divides a message into bits for processing.

E.

It is a symmetric key cipher.

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

A.

Policy Access Control

B.

Mandatory Access Control

C.

Discretionary Access Control

D.

Role-Based Access Control

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

A.

ARP

B.

ICMP

C.

TCP

D.

IGMP

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Which of the following processes identifies the threats that can impact the business continuity of operations?

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Endian firewall

C.

Packet filter firewall

D.

Proxy-based firewall