1.
Which of the following logical access control methods would a security administrator need to modify in order to control network traffic passing through a router to a different network?
2.
Which of the following tools limits external access to the network?
3.
Which of the following tools was created for the primary purpose of reporting the services that are open for connection on a networked workstation?
4.
Which of the following is MOST likely to be an issue when turning on all auditing functions within a system?
5.
Upon opening the browser, a guest user is redirected to the company portal and asked to agree to the acceptable use policy. Which of the following is MOST likely causing this to appear?
6.
USB devices with a virus delivery mechanism are an example of which of the following security threats?
7.
Cell phones with network access and the ability to store data files are susceptible to which of the following risks?
8.
When establishing a connection between two IP based routers, which of the following protocols is the MOST secure?
9.
Which of the following algorithms provides better protection against brute force attacks by using a 160-bit message digest?
10.
Which of the following access control technologies provides a rolling password for one-time use?