To be considered a strong algorithm, an encryption algorithm must be which of the following?
Correct Answer:
B
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP)?
Correct Answer:
D
Your organization is developing a network protection plan. No single aspect of your network seems more important than any other. You decide to avoid separating your network into segments or categorizing the systems on the network. Each device on the network is essentially protected in the same manner as all other devices.
This style of defense-in-depth protection is best described as which of the following?
Correct Answer:
A
Which of the following heights of fence deters only casual trespassers?
Correct Answer:
D
Validating which vulnerabilities in a network environment are able to be exploited by an attacker is called what?
Correct Answer:
B