Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

A.

Integrity

B.

Accountability

C.

Availability

D.

Confidentiality

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

A.

AH

B.

ESP

C.

IPcomp

D.

IKE

Which of the following firewalls inspects the actual contents of packets?

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

A.

IDEA

B.

PGP

C.

DES

D.

AES