1.
Which statement is true about a certificate authority (CA)?
2.
Which location will be recommended for extended or extended named ACLs?
3.
Which Public Key Cryptographic Standards (PKCS) defines the syntax for encrypted messages and messages with digital signatures?
4.
For the following items, which one acts as a VPN termination device and is located at a primary network location?
5.
What is the goal of an overall security challenge when planning a security strategy?
6.
Which threat are the most serious?
7.
Which option is the term for a weakness in a system or its design that can be exploited by a threat
8.
Which option is the term for the likelihood that a particular threat using a specific attack will exploit particular vulnerability of a system that results in an undesirable consequence?
9.
Which option is the term for what happens when a computer code is developed to take advantage of vulnerability? For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
10.
What is the first step you should take when considering securing your network?