Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

A company named Money Builders Inc., hires you to provide consultancy for setting up their Windows network. The company's server room will be in a highly secured environment. You are required to suggest an authentication method for it. The CFO of the company wants the server to use thumb impressions for authentication. Which of the following authentication methods will you suggest?

A.

Certificate

B.

Smart card

C.

Two-factor

D.

Biometrics

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

A.

Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.

B.

Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.

C.

Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.

D.

Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

A.

Detective access control

B.

Corrective access control

C.

Administrative access control

D.

Preventive access control

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

A.

RSA

B.

AES

C.

ECC

D.

DES

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A.

Construction and selection

B.

Site management

C.

Awareness training

D.

Access control

E.

Intrusion detection

F.

Personnel control

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Which of the following protocols work at the Network layer of the OSI model?

A.

Routing Information Protocol (RIP)

B.

File Transfer Protocol (FTP)

C.

Simple Network Management Protocol (SNMP)

D.

Internet Group Management Protocol (IGMP)

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

C.

Take a full backup daily with the previous night's tape taken offsite.

D.

Take a full backup on alternate days and keep rotating the tapes.

E.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

F.

Take a full backup daily with one tape taken offsite weekly.