00:00

QUESTION 51

To be considered a strong algorithm, an encryption algorithm must be which of the following?

Correct Answer: B

QUESTION 52

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?

Correct Answer: D

QUESTION 53

Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.
This style of defense-in-depth protection is best described as which of the following?

Correct Answer: A

QUESTION 54

Which of the following heights of fence deters only casual trespassers?

Correct Answer: D

QUESTION 55

Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?

Correct Answer: B