00:00

QUESTION 26

- (Exam Topic 1)
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 27

- (Exam Topic 2)
The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

Correct Answer: D

QUESTION 28

- (Exam Topic 2)
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: BCD

QUESTION 29

- (Exam Topic 2)
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Correct Answer: A

QUESTION 30

- (Exam Topic 2)
You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use?

Correct Answer: E