Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?
Which methods help you to recover your data in the event of a system or hard disk failure?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about DMZ is true?
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about Diffie-Hellman encryption are true?
Each correct answer represents a complete solution. Choose two.
Which of the following functions are performed by a firewall?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a type of intruder detection that involves logging network events to a file for an administrator to review later?
Which of the following are the centralized administration technologies?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following processes is known as sanitization?
Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. Choose three.
Which of the following statements about the One Time Password (OTP) security system are true?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |