Fill in the blank with the appropriate value.
SHA-1 produces a _________ -bit message digest.
You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?
You work as a Web Administrator for Perfect World Inc. The company is planning to host an Ecommerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?
Each correct answer represents a part of the solution. Choose two.
Which of the following are the goals of risk management?
Each correct answer represents a complete solution. Choose three.
Which of the following encryption algorithms are based on stream ciphers?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about asymmetric encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following are the common roles with regard to data in an information classification program?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about RSA algorithm are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about IEEE 802.1X standard are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about system hardening are true?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator for Net Perfect Inc. The company has a Windows 2000, TCP/IP-based class C network consisting of 200 hosts. The network uses private IP addressing. A computer on the network is connected to the Internet. The management plans to increase the number of hosts to 300. The management also wants all hosts to be able to access the Internet through the existing connection. Which of the following steps will you take to accomplish this?
Each correct answer represents a part of the solution. Choose two.
Which of the following processes is known as Declassification?
Which of the following works at the network layer and hides the local area network IP address and topology?
Which of the following provides high availability of data?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |