Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A.

UPS

B.

Multimeter

C.

SMPS

D.

CMOS battery

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

A.

WEP

B.

IPsec

C.

VPN

D.

SSL

Which of the following uses public key cryptography to encrypt the contents of files?

A.

EFS

B.

DFS

C.

NTFS

D.

RFS

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?

A.

Smart card

B.

USB device with cryptographic data

C.

CHAP

D.

Key fob

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

A.

Guarantee the reliability of standby systems through testing and simulation.

B.

Protect an organization from major computer services failure.

C.

Minimize the risk to the organization from delays in providing services.

D.

Maximize the decision-making required by personnel during a disaster.

Which of the following algorithms can be used to check the integrity of a file?

158

Each correct answer represents a complete solution. Choose two.

A.

md5

B.

rsa

C.

blowfish

D.

sha

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a network-based IDS

B.

Install a host-based IDS

C.

Install a DMZ firewall

D.

Enable verbose logging on the firewall

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

A.

Repeater

B.

Bridge

C.

Switch

D.

Router

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

A.

Theft

B.

Employee errors

C.

Strikes

D.

Frauds

You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?

A.

Discretionary access control (DAC)

B.

Role-based access control (RBAC)

C.

Mandatory access control (MAC)

D.

Access control list (ACL)