Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?

A.

Thermal alarm systems

B.

Security Guards

C.

Closed circuit cameras

D.

Encryption

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.

A.

ISDN

B.

X.25

C.

Frame Relay

D.

Leased line

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

A.

Identification

B.

Eradication

C.

Recovery

D.

Contamination

E.

Preparation

Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.

A.

A foreign key

B.

A private key

C.

A public key

D.

A primary key

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

A.

Executive management interviews

B.

Overlaying system technology

C.

Organizational chart reviews

D.

Organizational process models

You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?

A.

Technical guide

B.

Executive summary

C.

Checklist

D.

Department-specific plan

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

A.

IPSec

B.

PPPoE

C.

PPP

D.

TFTP

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

A.

Routers

B.

MAC addresses

C.

Firewalls

D.

Hub

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

A.

MAC

B.

Mutual authentication

C.

Three factor authentication

D.

Two factor authentication

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

A.

SWIPE

B.

S/MIME

C.

SKIP

D.

SLIP