Topic 1: Volume A
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
A. Ring topology
B. Tree topology
C. Star topology
D. Mesh topology
Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.
A. MS-CHAP v2
B. NTLM
C. EAP-MD5
D. EAP-TLS
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
A. It uses symmetric key pairs.
B. It provides security using data encryption and digital signature.
C. It uses asymmetric key pairs.
D. It is a digital representation of information that identifies users.
Which of the following ports must be opened on the firewall for the VPN connection using Point-to-Point Tunneling Protocol (PPTP)?
A. TCP port 110
B. TCP port 443
C. TCP port 5060
D. TCP port 1723
You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.
A. Parking lot
B. All hallways
C. Server Rooms
D. All offices
E. All entrance doors
Page 4 out of 48 Pages |
Previous |