1.
How to make sure that when an employee leaves the company permanently, the company will have access to their private keys?
2.
A DNS (Domain Name Service) server uses a specific port number. Choose this port number from the options.
3.
An outside auditor has been contracted to determine whether weak passwords are being used on the network. In order to achieve this goal, the auditor is running a password cracker against the master password file. Which of the following is an example of this?
4.
Which of the following access attacks would involve looking through your files in the hopes of finding something interesting?
5.
Identify the service provided by message authentication code (MAC) hash:
6.
A company wants to implement a VLAN. Senior management believes that a VLAN will be secure because authentication is accomplished by MAC addressing and that dynamic trunking protocol (DTP) will facilitate network efficiency. Which of the following issues should be discussed with senior management before VLAN implementation?
7.
John works as a network administrator for his company. On the monthly firewall log, he discovers that many internal PCs are sending packets on a routine basis to a single external PC. Which statement correctly describes what is happening?
8.
Pretty Good Privacy (PGP) uses a PKI Trust Model where no certificate authority (CA) is subordinate to another. The model with no single trusted root is known as:
9.
Which key can be used by a user to log into their network with a smart card?
10.
Which of the following would be an effective way to ensure that a compromised PKI key can not access a system?