1.
What is the primary method for device authentication in a VoIP network?
2.
Wired Equivalent Privacy (WEP) operates at what layer of the OSI model?
3.
According to the SAFE Layer 2 security white paper, which is not a threat to switches?
4.
This program does something undocumented which the programmer intended, but that the user would not approve of if he or she knew about it.
5.
What is the purpose of BGP TTL Security Hash (BTSH)?
6.
Which is true about the PIX Firewall in the remote site firewall option in the SAFE SMR remote user design environment?