Backup is required only for electric power and not electronic data....
Which of the following firewall policies is most restrictive?
Which of the following services when placed on the edge of the...
Which of the following is necessary even after an employee has...
Which of the following provide protection to the enterprise premises...
If you wish to allow the external users access your Web server you...
Which of the following can be termed as brute force attack?
Which part of the security policies must a user be aware of?
Which of the following is NOT a common type of social engineering...
Cryptography without keys is more secure than cryptography with keys....
Which of the following can affect productivity? Choose two
Does NTFS provide file system security?
Which of the following will allow you to take stock of sensitive data...
Which of the following port numbers is used by SMTP?
Which of the following processes will allow you to ascertain...
Which of the following can be termed as the Denial of Service Attack?
If you had to implement a foolproof method of establishing a User ID...
When debugging an Operating system, a programmer would make use of a...
Which of the following are encryption systems? Choose two.
It is ideal that a network supports a specific encryption standard...
Which of the following statements about a Modem are true? Choose two.
An authorized update is one way of securing the DNS server. T/F?
Which of the following is true about Public/Private key pairs? Choose...
The concept of public key cryptography was introduced by...
To prevent internal Web servers from being accessed you must block TCP...
Which of the following protocols help to gain MAC address of a PC on...
Which of the following does the Biometrics use to establish user...
Which of the following are an advantage and a disadvantage with clear...
Which of the following protocols could a VPN make use of? Choose two.
If you cannot afford a hot site, which of the following would be an...
Which of the following is essential for backing up burglar alarms and...
In case of fire, which o the following needs to be programmed to be...
Which of the following vulnerabilities could be a common error on the...
Stateful inspection firewall will operate on all the 7 layers of the...
What is the requirement for cryptography? Choose two.
A digital signature is synonymous to which of the following?
If you have implemented a DHCP in your network and you would wish to...
When employing message digest, if data does get modified, which of the...
Differential cryptanalysis is nothing but pattern studying. T/F?
RADIUS is abbreviation for Remote Access Data Inspection User Service....
RSA is the encryption system used in cellular devices. T/F?
Which of the following can be referred to as highly confidential data?
Surge protectors are meant to provide backup to electrical and...
You are configuring a VPN whose tunnel passes through the public...
As per a company policy, which of the following personnel should be...
Cyphertext can be used for punch system locks. T/F?
To allow access to a campus you would use Kerberos. T/F?
While assigning access privilege using the DAC, which of the following...
In symmetric-key encryption, one key will be used for encryption and...
Which of the following enhances the server available on the network?...
Which of the following will not be available on a cold site?
Which of the following is a Wireless LAN susceptible to?
Which of the following is the most common attack faced by the DES...
Which of the following will be compulsory tasks to run on Web servers...
Which of the following can secure your internal server best, against...
Which of the following are key components in the Kerberos system?...
The keys are measured by bytes. T/F?
Which of the following is the most popular protocol that is used in...
Which of the following are the two key-based algorithms?
Which of the following statements about the SHA (Security Hash...
Which of the following types of cryptography is possible? Choose two.
Which of the following statements are true about the way data...
Which of the following virus types can be transmitted via email?...
Which of the following are capable of functioning as a Firewall?...
When faced with an outgoing packet, which of the following header...
Which of the following is necessary when analyzing threats?
Which of the following will relates to how the external world can...
Which of the following is true about providing security to database...
Which of the following is an ideal practice to ensure network...
Which of the following is an essential configuration for email...
To transfer emails between email servers of different domains you...
When a remote user is dialing-in to the network, which of the...
Which of the following is an advantage of using conventional...
The block size in RC5 can range from 0 to 255. Y/N?
Which of the following is the best way to ensure that contact...
To which layer do the following communicating devices belong? Switch,...
Which of the following communications use the 2.4 GHz frequency?...
Which of the following is provided by IDEA? Choose two.
You are planning on hosting an eCommerce Web server. You are intent on...
Which of the following statements regarding Infrared communication is...
Which of the following is responsible for key issues relating to the...
Which of the following backup is the most time consuming to restore...
Which of the following is required by the cipher when it is important...
Which of the following about the Stateful inspection firewall is true?...
Which of the following best describes Ron's Code 2? (Select all...
Which of the following statements relating to the MAC model is true?...
Which of the following is true about a token system? Choose all that...
Which of the following will be required to perform Cryptanalysis?...
You are the system administrator for your organization. You are...
It is ideal for any organization to employ an encryption scheme that...
When configuring antivirus for email, which of the following...
Certificates are best used in which of the following scenarios? Choose...
If you wish to block FTP access to your Web server, which of the...
Which of the following is NOT a common type of social engineering...
L2TP can work over which of the following networks? Choose all...
Which of the following statements about Public Key Cryptography are...
Which of the following statements about an email server is/are true?...
Which of the following would help with dedicated authentication to...
Which of the following is an ideal location for storing the backup?...
Which of the following does NOT happen during a CHAP authentication?...