Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?
A. WAP
B. WEP
C. DES
D. PKI
Which of the following are core TCP/IP protocols that can be implemented with Windows NT to connect computers and internetworks?
Each correct answer represents a complete solution. Choose all that apply.
A. Address Resolution Protocol (ARP)
B. Network Link Protocol (NWLink)
C. User Datagram Protocol (UDP)
D. Internet Control Message Protocol (ICMP)
Which of the following is a pillar of Information Assurance CIA triad?
A. Integrity
B. Affiliation
C. Accessibility
D. Isolation
In which type of access control do user ID and password system come under?
A. Physical
B. Power
C. Technical
D. Administrative
Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?
A. Stakeholder expectation management
B. Stakeholder analysis
C. Work performance measurement
D. Project communication management
Which of the following books is used to examine integrity and availability?
A. Brown Book
B. Red Book
C. Purple Book
D. Orange Book
The method used to encrypt messages by transposing or scrambling the characters in a certain manner is known as ______.
A. Quantum cipher
B. Transposition cipher
C. Hybrid systems
D. Mathematical cipher
E. Substitution cipher
F. Steganography
Which of the following prevents malicious programs from attacking a system?
A. Smart cards
B. Anti-virus program
C. Firewall
D. Biometric devices
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains four Windows 2008 member servers and 250 Windows Vista client computers. One of the member servers works as a Web server that hosts an intranet Web site. According to the company security policy, Mark needs to fulfill the following requirements:
1.
Encryption should be used for authentication of all traffic to the Web site.
2.
SSL should not be used on the Web server for performance reasons.
3.
Users should be authenticated using their Active Directory credentials.
In order to fulfill the requirements, Mark has disabled the Anonymous Authentication setting on the server. What else does he have to do?
A. Enable the Anonymous Authentication setting on the server.
B. Enable the Encrypting File System (EFS) on the server.
C. Enable the Digest Authentication setting on the server.
D. Enable the Windows Authentication setting on the server.
Which of the following is used in asymmetric encryption?
A. Public key and user key
B. Public key and private key
C. SSL
D. NTFS