Which of the following is a technique used to attack an Ethernet wired or wireless network?
D
Which of the following refers to encrypted text?
D
Which of the following are the benefits of information classification for an organization?
A,C
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?
A
Which of the following are methods used for authentication?
Each correct answer represents a complete solution. Choose all that apply.
A,B,C,D
Which of the following protocols is used to verify the status of a certificate?
D
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______
characters.
A
You work as a Network Administrator for NetTech Inc. The company has a network that consists of
200 client computers and ten database servers. One morning, you find that a hacker is accessing
unauthorized data on a database server on the network. Which of the following actions will you take
to preserve the evidences?
Each correct answer represents a complete solution. Choose three.
B,C,D
Which of the following heights of fence deters only casual trespassers?
A
Which of the following statements about role-based access control (RBAC) model is true?
A
Which of the following statements about a fiber-optic cable are true?
Each correct answer represents a complete solution. Choose three.
A,B,D
Which of the following statements about the bridge are true?
Each correct answer represents a complete solution. Choose two.
B,D
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web
browser receives information and downloads content from Web sites. Which of the following
browser settings will Sam use to accomplish this?
B
Which of the following are used to suppress paper or wood fires?
Each correct answer represents a complete solution. Choose two.
A,D
Which of the following steps can be taken to protect laptops and data they hold?
Each correct answer represents a complete solution. Choose all that apply.
A,B,C,D