Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following does NOT concern itself with key management?

A.

Internet Security Association Key Management Protocol (ISAKMP)

B.

Diffie-Hellman (DH)

C.

Cryptology (CRYPTO)

D.

Key Exchange Algorithm (KEA)

Which of the following is less likely to be used today in creating a Virtual Private Network?

A.

L2TP

B.

PPTP

C.

IPSec

D.

L2F

Which of the following is best provided by symmetric cryptography?

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Non-repudiation

What is NOT true about a one-way hashing function?

A.

It provides authentication of the message

B.

A hash cannot be reverse to get the message used to create the hash

C.

The results of a one-way hash is a message digest

D.

It provides integrity of the message

Which of the following elements of telecommunications is not used in assuring confidentiality?

A.

Network security protocols

B.

Network authentication services

C.

Data encryption services

D.

Passwords

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does NOT have which of the following characteristics?

A.

Standard model for network communications

B.

Used to gain information from network devices such as count of packets received and routing tables

C.

Enables dissimilar networks to communicate

D.

Defines 7 protocol layers (a.k.a. protocol stack)

Which of the following statements pertaining to IPSec is incorrect?

A.

IPSec can help in protecting networks from some of the IP network attacks.

B.

IPSec provides confidentiality and integrity to information transferred over IP networks through transport layer encryption and authentication.

C.

IPSec protects against man-in-the-middle attacks.

D.

IPSec protects against spoofing.

Which of the following are WELL KNOWN PORTS assigned by the IANA?

A.

Ports 0 to 255

B.

Ports 0 to 1024

C.

Ports 0 to 1023

D.

Ports 0 to 127

The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram?

A.

TCP.

B.

ICMP.

C.

UDP.

D.

IGMP.

Which port does the Post Office Protocol Version 3 (POP3) make use of?

A.

110

B.

109

C.

139

D.

119

Why are coaxial cables called "coaxial"?

A.

it includes two physical channels that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis.

B.

it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis

C.

it includes two physical channels that carries the signal surrounded (after a layer of insulation) by another two concentric physical channels, both running along the same axis.

D.

it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running perpendicular and along the different axis

What is the maximum length of cable that can be used for a twisted-pair, Category 5 10Base-T cable?

A.

80 meters

B.

100 meters

C.

185 meters

D.

500 meters

Secure Electronic Transaction (SET) and Secure HTTP (S-HTTP) operate at which layer of the OSI model?

A.

Application Layer.

B.

Transport Layer.

C.

Session Layer.

D.

Network Layer.

Which of the following access methods is used by Ethernet?

A.

CSMA/CD.

B.

CSU/DSU.

C.

TCP/IP.

D.

FIFO.

A DMZ is also known as a

A.

screened subnet

B.

three legged firewall

C.

a place to attract hackers

D.

bastion host

If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some performance degradation. This implementation is sometimes called a:

A.

server farm

B.

client farm

C.

cluster farm

D.

host farm

What is a limitation of TCP Wrappers?

A.

It cannot control access to running UDP services.

B.

It stops packets before they reach the application layer, thus confusing some proxy servers.

C.

The hosts. access control system requires a complicated directory tree.

D.

They are too expensive.

Which of the following is an advantage that UDP has over TCP?

A.

UDP is connection-oriented whereas TCP is not.

B.

UDP is more reliable than TCP.

C.

UDP is faster than TCP.

D.

UDP makes a better effort to deliver packets.

Which of the following packets should NOT be dropped at a firewall protecting an organization's internal network?

A.

Inbound packets with Source Routing option set

B.

Router information exchange protocols

C.

Inbound packets with an internal address as the source IP address

D.

Outbound packets with an external destination IP address

What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?

A.

SYN Flood attack

B.

Smurf attack

C.

Ping of Death attack

D.

Denial of Service (DOS) attack