00:00

QUESTION 11

- (Exam Topic 1)
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Correct Answer: A

QUESTION 12

- (Exam Topic 2)
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Correct Answer: C

QUESTION 13

- (Exam Topic 2)
Which of the following algorithms can be used to check the integrity of a file? 158
Each correct answer represents a complete solution. Choose two.

Correct Answer: AD

QUESTION 14

- (Exam Topic 2)
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

Correct Answer: CD

QUESTION 15

- (Exam Topic 1)
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: BCD