Topic 1: Volume A
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
A. Mutual
B. Anonymous
C. Multi-factor
D. Biometrics
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
A. PMK
B. PTK
C. PKI
D. GTK
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
A. Disaster recovery plan
B. Contingency plan
C. Business continuity plan
D. Crisis communication plan
Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?
A. SWIPE
B. S/MIME
C. SKIP
D. SLIP
Which of the following firewalls inspects the actual contents of packets?
A. Packet filtering firewall
B. Stateful inspection firewall
C. Application-level firewall
D. Circuit-level firewall
Page 11 out of 48 Pages |
Previous |