1.
Which of the following provides the strongest authentication security on a wireless network?
2.
Which of the following is a concern when encrypting wireless data with WEP?
3.
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
4.
While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing?
5.
Users report that after downloading several applications, their systems' performance has noticeably decreased. Which of the following would be used to validate programs prior to installing them?
6.
Which of the following is used to verify data integrity?
7.
Which of the following can be implemented with multiple bit strength?
8.
To ensure compatibility with their flagship product, the security engineer is tasked to recommend an encryption cipher that will be compatible with the majority of third party software and hardware vendors. Which of the following should be recommended?
9.
Which of the following provides additional encryption strength by repeating the encryption process with additional keys?
10.
A bank has a fleet of aging payment terminals used by merchants for transactional processing. The terminals currently support single DES but require an upgrade in order to be compliant with security standards. Which of the following is likely to be the simplest upgrade to the aging terminals which will improve in-transit protection of transactional data?