Topic 2: Volume B
Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.
A. It hides the internal IP addressing scheme.
B. It protects network from the password guessing attacks.
C. It is used to connect private networks to the public Internet.
D. It shares public Internet addresses with a large number of internal network clients.
Fill in the blank with the appropriate encryption system. The encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.
A. ElGamal
Which of the following should the administrator ensure during the test of a disaster recovery plan?
A. Ensure that the plan works properly
B. Ensure that all the servers in the organization are shut down.
C. Ensure that each member of the disaster recovery team is aware of their responsibility.
D. Ensure that all client computers in the organization are shut down.
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?
A. Structured walk-through test
B. Simulation test
C. Full-interruption test
D. Parallel test
You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?
A. MD
B. NTLM
C. MAC
D. SHA
Page 14 out of 48 Pages |
Previous |