00:00

QUESTION 46

Which of the following protocols does IPsec use to perform various security functions in the network?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 47

Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: BCD

QUESTION 48

What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?

Correct Answer: B

QUESTION 49

Which of the following attacks involves multiple compromised systems to attack a single target?

Correct Answer: B

QUESTION 50

Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Correct Answer: B