Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?
Which of the following is used to authenticate asymmetric keys?
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?
Which of the following types of halon is found in portable extinguishers and is stored as a liquid?
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
Which of the following decides access control on an object in the mandatory access control (MAC) environment?
Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.
Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.
You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?
Which of the following algorithms is found to be suitable for both digital signature and encryption?
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.
Which of the following protocols work at the Network layer of the OSI model?
Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?
Which of the following authentication methods provides credentials that are only valid during a single session?
Which of the following is a form of gate that allows one person to pass at a time?
You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?
An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?