Topic 1: Volume A
Which of the following types of attacks cannot be prevented by technical measures only?
A. Social engineering
B. Brute force
C. Smurf DoS
D. Ping flood attack
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
A. RADIUS
B. TACACS+
C. Media Access control
D. Peer-to-Peer
Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?
A. Skipjack
B. Blowfish
C. AES
D. IDEA
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
A. Integrity
B. Accountability
C. Availability
D. Confidentiality
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
A. IP Security (IPSec)
B. Microsoft Point-to-Point Encryption (MPPE)
C. Pretty Good Privacy (PGP)
D. Data Encryption Standard (DES)
Page 13 out of 48 Pages |
Previous |