1.
Choose the primary disadvantage of using a third party mail relay.
2.
Which method is the easiest to disable a 10Base2 network?
3.
Choose the option that details one of the primary benefits of using S/MIME /Secure Multipurpose Internet Mail Extension)?
4.
For the following items, which is a security limitation of virtualization technology?
5.
Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. A HIDS is installed to monitor which of following?
6.
On the topic of comparing viruses and hoaxes, which statement is TRUE? Choose the best TRUE statement.
7.
The purpose of a DNS server is to enable people and applications to lookup records in DNS tables. Why implement security logging on a DNS server?
8.
Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data.
9.
Which security threat will affect PCs and can have its software updated remotely by a command and control center?
10.
Which of the following web vulnerabilities is being referred to when it receives more data than it is programmed to accept?