Topic 2: Volume B
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
A. Repeater
B. Bridge
C. Switch
D. Router
Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?
A. ESP
B. AH
C. IKE
D. ISAKMP
Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?
A. Critical path analysis
B. Functional analysis
C. Risk analysis
D. Business impact analysis
You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.
A. It relies upon a system of security associations.
B. It provides key generation mechanisms.
C. It authenticates communicating peers.
D. It protects against threats, such as DoS attack, replay attack, etc.
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
A. Eradication
B. Identification
C. Recovery
D. Containment
Page 3 out of 48 Pages |
Previous |