Which of the following elements of planning gap measures the gap between the total potential for
the market and the actual current usage by all the consumers in the market?
D
Which of the following terms refers to the method that allows or restricts specific types of packets
from crossing over the firewall?
B
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails.
Which of the following will you use to accomplish this?
A
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote
users to connect and access its private network through a dial-up connection via the Internet. All the
data will be sent across a public network. For security reasons, the management wants the data sent
through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP)
connection. Which communication protocol will Peter use to accomplish the task?
A
Which of the following protocols multicasts messages and information among all member devices in
an IP multicast group?
D
Which of the following security devices is presented to indicate some feat of service, a special
accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment
or student status, or as a simple means of identification?
D
Which of the following is a method for transforming a message into a masked form, together with a
way of undoing the transformation to recover the message?
A
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those
resources that are required for them. Which of the following access control models will he use?
D
Which of the following is used to authenticate asymmetric keys?
A
IPsec VPN provides a high degree of data privacy by establishing trust points between
communicating devices and data encryption. Which of the following encryption methods does IPsec
VPN use? Each correct answer represents a complete solution. Choose two.
D,C
A user is sending a large number of protocol packets to a network in order to saturate its resources
and to disrupt connections to prevent communications between services. Which type of attack is
this?
A
Which of the following types of firewall functions at the Session layer of OSI model?
A
Which of the following statements about a stream cipher are true? Each correct answer represents a
complete solution. Choose three.
A, D,E
Which of the following types of attack can be used to break the best physical and logical security
mechanism to gain access to a system?
A
You are the Security Consultant advising a company on security methods. This is a highly secure
location that deals with sensitive national defense related dat
a. They are very concerned about physical security as they had a breach last month. In that breach an
individual had simply grabbed a laptop and ran out of the building. Which one of the following would
have been most effective in preventing this?
C