1.
Which of the following VPN implementations consists of taking IPv6 security features and porting them to IPv4?
2.
A user is assigned access rights based on the function within the organization. This is a feature of which of the following types of access control models?
3.
Which of the following types of malicious software travels across computer networks without requiring a user to distribute the software?
4.
Which of the following would be MOST important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction?
5.
A task-based control model is an example of which of the following?
6.
Which of the following freeware forensic tools is used to capture packet traffic from a network?
7.
Which of the following must be installed for HTTPS to work properly on a web site?
8.
You work as the security administrator. You want to implement a solution which will provide a WLAN (Wireless Local Area Network) with the security typically associated with a wired LAN (Local Area Network): Which solution should you implement?
9.
Which of the following BEST describes an attack that takes advantage of a computer not fully updated with the most recent operating system patches?
10.
Secret Key encryption is also known as: