Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

A.

Mark as final

B.

Digital Signature

C.

Restrict Permission

D.

Encrypt Document

Full Access
Question # 5

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Full Access
Question # 6

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

A.

IPSec

B.

PPPoE

C.

PPP

D.

TFTP

Full Access
Question # 7

Which of the following layers of the OSI model provides non-repudiation services?

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Full Access
Question # 8

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

A.

Access control

Full Access
Question # 9

You are responsible for security at a defense contracting firm. You are evaluating various possible encryption algorithms to use. One of the algorithms you are examining is not integer based, uses shorter keys, and is public key based. What type of algorithm is this?

A.

Symmetric

B.

None - all encryptions are integer based.

C.

Elliptic Curve

D.

RSA

Full Access
Question # 10

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Full Access
Question # 11

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.

Asymmetric

B.

Symmetric

C.

S/MIME

D.

PGP

Full Access
Question # 12

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall

Full Access
Question # 13

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

A.

Routers

B.

MAC addresses

C.

Firewalls

D.

Hub

Full Access
Question # 14

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

A.

RADIUS

B.

TACACS+

C.

Media Access control

D.

Peer-to-Peer

Full Access
Question # 15

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

A.

Theft

B.

Employee errors

C.

Strikes

D.

Frauds

Full Access
Question # 16

You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?

A.

Technical guide

B.

Executive summary

C.

Checklist

D.

Department-specific plan

Full Access
Question # 17

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

A.

MAC

B.

Mutual authentication

C.

Three factor authentication

D.

Two factor authentication

Full Access
Question # 18

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a network-based IDS

B.

Install a host-based IDS

C.

Install a DMZ firewall

D.

Enable verbose logging on the firewall

Full Access
Question # 19

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.

Structured walk-through test

B.

Simulation test

C.

Full-interruption test

D.

Parallel test

Full Access
Question # 20

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A.

CHAP

B.

PEAP

C.

EAP

D.

EAP-TLS

Full Access
Question # 21

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

A.

AES

B.

SHA

C.

MD5

D.

DES

Full Access
Question # 22

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

A.

Transport layer

B.

Physical layer

C.

Data Link layer

D.

Network layer

Full Access
Question # 23

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

A.

Social Engineering attack

B.

Brute Force attack

C.

War dialing attack

D.

Replay attack

Full Access
Question # 24

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A.

The transport layer

B.

The presentation layer

C.

The session layer

D.

The application layer

Full Access
Question # 25

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?

A.

RSTP

B.

SKIP

C.

OCSP

D.

HTTP

Full Access
Question # 26

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

A.

TACACS

B.

S-RPC

C.

RADIUS

D.

CHAP

Full Access
Question # 27

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

A.

Synchronous

B.

Secret

C.

Asymmetric

D.

Symmetric

Full Access
Question # 28

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.

Ring topology

B.

Tree topology

C.

Star topology

D.

Mesh topology

Full Access
Question # 29

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Full Access
Question # 30

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Full Access
Question # 31

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Full Access
Question # 32

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Full Access
Question # 33

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Full Access
Question # 34

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Full Access
Question # 35

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Full Access