Which of the following is used to authenticate asymmetric keys?
A. Digital signature
B. MAC Address
C. Demilitarized zone (DMZ)
D. Password
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?
A. SPAP
B. MSCHAP
C. PAP
D. MSCHAP V2
Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?
A. Pre-shared key authentication
B. Open system authentication
C. Shared key authentication
D. Single key authentication
Which of the following protocols work at the Network layer of the OSI model?
A. Routing Information Protocol (RIP)
B. File Transfer Protocol (FTP)
C. Simple Network Management Protocol (SNMP)
D. Internet Group Management Protocol (IGMP)
Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.
A. Soda acid
B. Kerosene
C. Water
D. CO2
Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.
A. Ethernet (IEEE 802.3)
B. Token ring (IEEE 802.5)
C. Fiber Distributed Data Interface (FDDI)
D. Wireless LAN (IEEE 802.11b)
Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?
A. Thermal alarm systems
B. Security Guards
C. Closed circuit cameras
D. Encryption
In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?
A. In person attack
B. Third-party authorization attack
C. Impersonation attack
D. Important user posing attack
Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?
A. Domain Controller
B. Certificate User
C. Certification Authority
D. Internet Authentication Server
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?
A. UPS
B. Multimeter
C. SMPS
D. CMOS battery