1.
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
2.
Which of the following is BEST used to capture and analyze network traffic between hosts on the same network segment?
3.
After a number of highly publicized and embarrassing customer data leaks as a result of social engineering attacks by phone, the Chief Information Officer (CIO) has decided user training will reduce the risk of another data leak. Which of the following would be MOST effective in reducing data leaks in this situation?
4.
Which of the following functions provides an output which cannot be reversed and converts data into a string of characters?
5.
Which of the following encrypts data a single bit at a time?
6.
Which of the following is used to verify data integrity?
7.
Access mechanisms to data on encrypted USB hard drives must be implemented correctly otherwisE.
8.
Maintenance workers find an active network switch hidden above a dropped-ceiling tile in the CEO's office with various connected cables from the office. Which of the following describes the type of attack that was occurring?
9.
A security administrator is segregating all web-facing server traffic from the internal network and restricting it to a single interface on a firewall. Which of the following BEST describes this new network?
10.
Which of the following was based on a previous X.500 specification and allows either unencrypted authentication or encrypted authentication through the use of TLS?