- (Exam Topic 1)
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Correct Answer:
A
- (Exam Topic 2)
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Correct Answer:
C
- (Exam Topic 2)
Which of the following algorithms can be used to check the integrity of a file? 158
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AD
- (Exam Topic 2)
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
Correct Answer:
CD
- (Exam Topic 1)
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
BCD